| ▲ | georgeburdell 5 hours ago | |||||||
The article mentions that there’s an identification process and that at least some data has access control. What were you expecting? | ||||||||
| ▲ | truelson 5 hours ago | parent [-] | |||||||
You're wiring up a number of critical systems... and prompt injection here could be really bad. I worry about such systems with a single point of contact | ||||||||
| ||||||||