Hacker News
new
|
past
|
comments
|
ask
|
show
|
jobs
|
submit
login
johnisgood
5 days ago
|
parent
|
context
|
favorite
| on:
Cowork: Claude Code for the rest of your work
The response to the user is itself an exfiltration channel. If the LLM can read secrets and produce output, an injection can encode data in that output. You haven not cut off a leg, you have just made the attacker use the front door, IMO.
Guidelines
|
FAQ
|
Lists
|
API
|
Security
|
Legal
|
Apply to YC
|
Contact
Search: