| ▲ | wj 3 days ago | |||||||
From a practical point of view, what are people thinking about what is considered trustworthy input? Is the data in your CRM trusted? Keeping the orchestration (and state changes) outside of the LLM is where my thinking is at until I can figure out the answer to that question (among others). | ||||||||
| ▲ | simonw 3 days ago | parent [-] | |||||||
Anything an adversarial attacker might be able to populate is untrusted. If there's a form they can use to add things to the CRM then that's tainted too. | ||||||||
| ||||||||