←back to thread

435 points crawshaw | 1 comments | | HN request time: 0.947s | source
Show context
kuahyeow ◴[] No.44000013[source]
What protection do people use when enabling an LLM to run `bash` on your machine ? Do you run it in a Docker container / LXC boundary ? `chroot` ?
replies(2): >>44000369 #>>44002663 #
CGamesPlay ◴[] No.44000369[source]
The blog post in question is on the site for Sketch, which appears to use Docker containers. That said, I use Claude Code, which just uses unsandboxed commands with manual approval.

What's your concern? An accident or an attacker? For accidents, I use git and backups and develop in a devcontainer. For an attacker, bash just seems like an ineffective attack vector; I would be more worried about instructing the agent to write a reverse shell directly into the code.

replies(2): >>44001584 #>>44002882 #
zahlman ◴[] No.44001584[source]
> For an attacker, bash just seems like an ineffective attack vector

All it needs to do is curl and run the actual payload.

replies(2): >>44001663 #>>44002359 #
1. ◴[] No.44001663[source]