| ▲ | frolvlad 4 hours ago | |
Instead of expecting the tools to adhere, they are enforced. For example, to make an HTTP call with a secret key, the tool must use the proxy service that will enforce that the secret key is only used for the specific domain, if that is allowed, then the proxy service will make the call, thus the secret never leaks outside of the service. However, this design is still under development as it creates quite a bit of challenges. | ||
| ▲ | 4 hours ago | parent [-] | |
| [deleted] | ||