1. Least privilege can address a lot of these issues. We all know that, but in practice we don't really apply it because it can be a pain.
2. These applications are interesting because they can interpret meaning instead of rigidly following instructions, but that makes them prone to misunderstanding and manipulation. That breaks a lot of our assumptions about how software responds to input.
3. It's helpful to think of these applications in terms of impersonation. The user's rights should be the upper bound of the LLM's permissions when it acts on their behalf.
4. Ideally, we'd also constrain permissions according to the task being performed, but that's trickier.
The article goes into all that in exhaustive (some might say tedious) detail. It was a difficult write because this space moves so quickly and has so much hype, but it's been a good exercise to try to sift through that and think about it seriously.
(edited because I don't know how to make a legible list)
pvg•4h ago
forks•4h ago
meghan•4h ago
pvg•3h ago