Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

What isolation is there? If a compromised sub agent returns data that gets inserted into the main agents context (structured or not) then the end result is the same as if the main agent was directly interacting with the compromising resource is it not?


Exactly. You can't both give the model access AND enforce security. You CAN convince yourself you've done it though. You see it all the time, including in this thread.


Perhaps a reference to the data can be inserted in prompt. thee key or filename




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: