upvote
Problem 2 is mitigated by only allowing trusted sources through firewall rules.
reply
I think these are 2 independent axis:

1. Destructive by accident 2. Destructive because it was prompt-injected

And

1. Fucks up filesystem 2. Fucks up external systems via credentials

reply