▲ | christophilus 5 days ago | |||||||||||||
Run Claude Code in a locked down container or VM that has no access to sensitive data, and review all of the code it commits? | ||||||||||||||
▲ | spacebanana7 5 days ago | parent | next [-] | |||||||||||||
Conceivably couldn’t a post install script be used for the malicious dependency to install its own instance of Claude code (or similar tool)? In which case you couldn’t really separate your dev environment from a hostile LLM. | ||||||||||||||
| ||||||||||||||
▲ | myaccountonhn 5 days ago | parent | prev [-] | |||||||||||||
As a separate locked-down user would probably also work. |