Settings

Theme

Ask HN: Could LLMs be used for sandboxing programs?

1 points by ekns 3 years ago · 2 comments · 1 min read


Today I was thinking that for many programs, you could probably formulate some restrictions on what exactly they should be able to do using LLMs (access home/dotfiles/secrets, network, etc.)

It's cumbersome to set up the configuration for exactly the "expected" capabilities (at least I never bother). So I was wondering, could one do something like trapping syscalls and using LLM as an exception handler for each category, until a complete profile is built for the program. After that, there should be no overhead for the LLM/sandboxer.

The top-level input would be something like "foo is a multiplayer game" or "baz is like youtube-dl".

al2o3cr 3 years ago

What happens when a malicious program figures out the syscall-pattern equivalent of a "pretend I'm a a hypervisor" prompt?

  • compressedgas 3 years ago

    You wouldn't be having the LLM be a security monitor. Rather the LLM would be used as an aide to generate the policy which already existing enforcement mechanisms would enforce.

Keyboard Shortcuts

j
Next item
k
Previous item
o / Enter
Open selected item
?
Show this help
Esc
Close modal / clear selection