Replies: 3 comments 3 replies
-
|
I personally vote yes for this feature. This is overprotective IMO. |
Beta Was this translation helpful? Give feedback.
-
|
What do you think about having a "steering" or background agent evaluating shell command risk? That's what I'm going to do in puppy. |
Beta Was this translation helpful? Give feedback.
-
|
I agree as well — enabling the feature seems more valuable than exposing the path directly. That said, I personally prefer a more cautious strategy: keeping an explicit setting helps preserve the experience for users who rely on the current default, and feels more respectful to those with specific needs. |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
We inherited a security feature from Gemini that disabled shell substitutions in shell commands. We created an ephemeral to enable them that is set by profile. I understand the issue with shell substitutions but there is virtually nothing the model couldn't do by just writing a shell script and running it. With shell substitutions off the model tends to do stupid things like read your PAT and put it directly on the command line so it shows up on the screen, gets sent to more people on the internet than need it and embed it in files. With shell substitution it is easier for it to do things like $(cat ~/.your_pat). I'd like to propose enabling shell subtitution by default or maybe adding to /settings (config) whether the default is on/off. Ephermerals (/set and profiles) will still take precidence.
3 votes ·
Beta Was this translation helpful? Give feedback.
All reactions