TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Ask HN: Could LLMs be used for sandboxing programs?

1 pointsby eknsabout 2 years ago
Today I was thinking that for many programs, you could probably formulate some restrictions on what exactly they should be able to do using LLMs (access home&#x2F;dotfiles&#x2F;secrets, network, etc.)<p>It&#x27;s cumbersome to set up the configuration for exactly the &quot;expected&quot; capabilities (at least I never bother). So I was wondering, could one do something like trapping syscalls and using LLM as an exception handler for each category, until a complete profile is built for the program. After that, there should be no overhead for the LLM&#x2F;sandboxer.<p>The top-level input would be something like &quot;foo is a multiplayer game&quot; or &quot;baz is like youtube-dl&quot;.

1 comment

al2o3crabout 2 years ago
What happens when a malicious program figures out the syscall-pattern equivalent of a &quot;pretend I&#x27;m a a hypervisor&quot; prompt?
评论 #35853945 未加载