| ▲ | gwerbin a day ago | |
And yet none of these tools have sensible or working permission configs. Apart from prompt-and-pray or requiring explicit permission for every file operation and shell commands, the only genuine way to stop them from running destructive operations is OS-level sandboxing. From a security and error-safety perspective, all of these tools are like letting a bright and curious 8 year old have full access to your machine. | ||