top | item 46595207

(no title)

0xferruccio | 1 month ago

The primary exfiltration vector for LLMs is making network requests via images with sensitive data as parameters.

As Claude Code increasingly uses browser tools, we may need to move away from .env files to something encrypted, kind of like rails credentials, but without the secret key in the .env

discuss

order

SahAssar|1 month ago

So you are going to take the untrusted tool that kept leaking your secrets, keep the secrets away from it but still use it to code the thing that uses the secrets? Are you actually reviewing the code it produces? In 99% of cases that's a "no" or a soft "sometimes".

TeMPOraL|1 month ago

That's exactly what one does with their employees when one deploys "credential vaults", so?

xyzzy123|1 month ago

One tactic I've seen used in various situations is proxies outside the sandbox that augment requests with credentials / secrets etc.

Doesn't help in the case where the LLM is processing actually sensitive data, ofc.

touristtam|1 month ago

Can't use a tool like dotenvx?