0o_MrPatrick_o0's comments

0o_MrPatrick_o0 | 1 month ago | on: Install.md: A standard for LLM-executable installation

Using IaC tools gives you the following advantages:

1. IaC gives you Idempotent solutions- which is advantageous over an agent. What if the agent crashes half way through deployment procedures? How will you reliably resume an interrupted install?

2. IaC gives you reproducible builds

3. IaC gives you ability to install tools in a way that can be tested for compliance with any deployment standards you have

W/r/t frontier models:

Just tell them to go install stuff. They already have so much in their training corpus that you literally do not need to create this.

7b-14b parameter self hosted models may get some benefit from your approach. I find self hosted is less reliable for tasteful approaches. Micromanagement yields better results.

0o_MrPatrick_o0 | 1 month ago | on: Bubblewrap: A nimble way to prevent agents from accessing your .env files

You’ve got my intent correct!

Where I’m at with #2 is the agent builds a prototype with its own private session credentials.

I have orchestration created that can replicate the prototyping session.

From there I can keep final build keys secret from the agent.

My build loop is meant to build an experiment first, and then an enduring build based on what it figures out.

0o_MrPatrick_o0 | 1 month ago | on: Bubblewrap: A nimble way to prevent agents from accessing your .env files

If your prompt is complex enough, doesn’t seem to get triggered.

I use a lot of ansible to manage infra, and before I learned about ansible-vault, I was moving some keys around unprotected in my lab. Bad hygiene- and no prompt intervening.

Kinda bums me out that there may be circumstances where the model just rejects this even if you for some reason you needed it.

0o_MrPatrick_o0 | 1 month ago | on: Bubblewrap: A nimble way to prevent agents from accessing your .env files

Hi!

Yes that is correct. However, I think embedding bubblewrap in the binary is risky design for the end user.

They are giving users a convenience function for restricting the Claude instance’s access rights from within a session.

Thats helpful if you trust the client, but what if there is a bug in how the client invokes the bubblewrap container? You wouldn’t have this risk if they drove you to invoke Claude with bubblewrap.

Additionally, the pattern using bubblewrap in front of Claude can be exactly duplicated and applied to other coding agents- so you get consistency in access controls for all agents.

I hope the desirability of this having consistent access controls across all agents is shared by others. You don’t get that property if you use Claude’s embedded control. There will always be an asterisk about whether your opinion and theirs will be similar with respect to implementation of controls.

0o_MrPatrick_o0 | 1 month ago | on: Encrypt Your .env in a Meme

Man- I am noticing so many people are writing and ruminating on the defense of the .env file right now!

I can't tell if the project name ("memevault") implies that this is a real tool or a jab at us ruminating weirdos X'D

page 1