▲ | pamelafox 2 days ago | |
How do you determine if the tools access private data? Is it based solely on their tool description (which can be faked) or by trying them in a sandboxed environment or by analyzing the code? | ||
▲ | 76SlashDolphin 2 days ago | parent [-] | |
It is based on what the MCP server reports to us. As with most current LLM clients we assume that the user has checked the MCP servers they're using for authenticity. |