| ▲ | mh- 13 hours ago | ||||||||||||||||
Not the person you're replying to, but: I just use a separate, dedicated Chrome profile that isn't logged into anything except what I'm working on. Then I keep the persistence, but without commingling in a way that dramatically increases the risk. edit: upon rereading, I now realize the (different) prompt injection risk you were calling out re: the handoff to yt-dlp. Separate profiles won't save you from that, though there are other approaches. | |||||||||||||||||
| ▲ | bartek_gdn 10 hours ago | parent | next [-] | ||||||||||||||||
That's also my approach, built quickly a cli for this with lightweight session management | |||||||||||||||||
| ▲ | sofixa 12 hours ago | parent | prev [-] | ||||||||||||||||
Even without the bash escape risk (which can be mitigated with the various ways of only allowing yt-dlp to be executed), YT Music is a paid service gated behind a Google account, with associated payment method. Even just stealing the auth cookie is pretty serious in terms of damage it could do. | |||||||||||||||||
| |||||||||||||||||