Also, "ssh -A" is your friend. Keep your ssh key on your yubikey where you control it. Let Claude play on it's own VM and in its own clone of your repo. Only when you choose to add the -A, do you temporarily, for that one ssh connection, have the possibility to push Claude's work to your repo, where you can review it.
Treat it as a colleague, making PRs that you review.
Currently also have copper and Sunrise cable. Just got the cables to the house two weeks ago. I’m now waiting for the local electricity company to get in-house installation. Everything at no costs. So yes, it’s progressing fast.
When I watch how little influence I have on my children from my spoken advice, and recall how many lessons people tried to teach me which I had to learn myself, I laugh at the eternal pointlessness of writing like this.
It's a big if because the threat model normally includes "bad guys can forge messages". Which means that the input is untrusted and you want to generate your own domain separation bytes for the hash function, not let your attacker choose them.
Treat it as a colleague, making PRs that you review.
reply