Hacker News
new
past
comments
ask
show
jobs
points
by
dawg91
3 hours ago
|
comments
by
amluto
3 hours ago
|
[-]
And what do those tools access? How? If I ask the agent to edit a CSV file, what’s the actual workflow? What prevents it from editing a different file due to a prompt injection attack?
reply