Hacker Newsnew | past | comments | ask | show | jobs | submit | edf13's commentslogin

Yes - for many legacy systems especially in compliance related areas.

Could you elaborate? I am new to edi.

Agree, that’s why we’re building grith.ai

Sandboxing alone isn’t the right approach… a multi-faceted approach is what works.

What we’ve found that does work is automation on the approval process but only with very strong guards in place… approval fatigue is another growing problem - users simply clicking approve on all requests.


Interesting. How are the security filters implemented?

Every system call, file access, net access etc is forced through a local “proxy” where 17 individual filters check what’s going on.

Everything is done locally via our grith cli tool.

Happy to answer any questions on hello@grith.ai too


Was grift.ai too expensive?


That’s one of the reasons we’re building grith.ai ~ these ‘claw’ tools are getting too easy for use (which is good)… but they need securing!

Little too lexically close to girth

Haha - maybe… naming projects is hard!

It’s an interesting experiment… but I expect it to quickly die off as the same type message is posted again and again… their probably won’t be a great deal of difference in “personality” between each agent as they are all using the same base.


They're not though, you can use different models, and the bots have memories. That combined with their unique experiences might be enough to prevent that loop.


AI models have a tendency to like purple and similar shades.


I’d like more granular controls - sometimes I don’t want to trust the entire project but I do want to trust my elements of it


I think he’s asking rather than giving instructions


He's prompting


> let's enjoy the party while VCs are financing it!

The VC money is there until they can solve the optimization problems


Terrible name…


Key part of the article../

“if the user configures ‘always allow’ for any command”


> In the documentation, IBM warns that setting auto-approve for commands constitutes a 'high risk' that can 'potentially execute harmful operations' - with the recommendation that users leverage whitelists and avoid wildcards

Users have been trained to do this, as shifting the burden to the user with no way to enforce bounds or even sensible defaults.

E.G. I can guarantee that people will whitelist bwrap, crun, docker, expecting to gain advantage from isolation, while the caller can override all of those protections with arguments.

The reality is that we have trained the public to allow local code execution on their devices to save a few cents on a hamburger, we can’t have it both ways.

Unless you are going to teach everyone that they need to make sure address family 40, openat2(), etc.. are unsafe, users have no way to win right now.

The use case has to either explicitly harden or shift blame.

With Opendesktop, OCI, systemd, and kernel all making locally optimal decisions, the reality is that ephemeral VMs is the only ‘safe’ way to run untrusted code today.

Sandboxes can be better but containers on a workstation (without a machine VM) are purely theatre.


Another key part: the command can be displayed as just `echo`, but allows execution of anything


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: