We're working on solving this problem as well. It could be p...

redshift

npub1ftt05tgku25m2akgvw6v7aqy5ux5mseqcrzy05g26ml43xf74nyqsredsh

hex

5342eb98c4bb021e73424e948f0253ecc0e816e43a7616136d5d06a62ef4d282

nevent

nevent1qqs9xshtnrztkqs7wdpya9y0qff7es8gzmjr5askzdk46p4x9m6d9qsprpmhxue69uhhyetvv9ujuem4d36kwatvw5hx6mm9qgsy44h695tw92d4wmyx8dx0wsz2wr2dcvsvp3z86y9ddl6cnyl2ejqvw32cy

Kind-1 (TextNote)

2026-05-03T12:19:29Z

↳ Reply to Leo Wandersleb (npub1gm7tuvr9atc6u7q3gevjfeyfyvmrlul4y67k7u7hcxztz67ceexs078rf6)

The concern is legit. Don't get offended. Especially getting in between for spying is certainly an underappreciated concern.

We're working on solving this problem as well. It could be possible to prove that there was no prompt injection/tampering in the middle up to the source. So Routstr nodes cannot screw with user's systems/steal anything.

Also, PPQ.ai, OpenRouter, Anthropic, all of these in the pipeline is probably spying on you and are vulnerable to the exact same attack vector. If it's not running locally, you should assume that it's not 100% secure is being spied on and have your agents run in sandboxes.

Raw JSON

{
  "kind": 1,
  "id": "5342eb98c4bb021e73424e948f0253ecc0e816e43a7616136d5d06a62ef4d282",
  "pubkey": "4ad6fa2d16e2a9b576c863b4cf7404a70d4dc320c0c447d10ad6ff58993eacc8",
  "created_at": 1777810769,
  "tags": [
    [
      "e",
      "b65a21d7d19bcb960876ad5cd6649da827f09f4056fba0e1ca2d0cc77907a4fd",
      "wss://nostr.wine/",
      "root",
      "f985d309197c805e1719c73185b574fc3ee407d7c1b6157dee99c6ace2599bbb"
    ],
    [
      "e",
      "5130c94eb2dc43cbbed7a7afd5479910b59b9e2f74ebcee2a423d713c38bb63f",
      "wss://relay.primal.net/",
      "reply",
      "46fcbe3065eaf1ae7811465924e48923363ff3f526bd6f73d7c184b16bd8ce4d"
    ],
    [
      "p",
      "8bf629b3d519a0f8a8390137a445c0eb2f5f2b4a8ed71151de898051e8006f13"
    ],
    [
      "p",
      "2efaa715bbb46dd5be6b7da8d7700266d11674b913b8178addb5c2e63d987331"
    ],
    [
      "p",
      "f985d309197c805e1719c73185b574fc3ee407d7c1b6157dee99c6ace2599bbb"
    ],
    [
      "p",
      "d22bcdb1d2505bc060f65a86cd5f20532ec5f3e41c06aea9edac39f6ba76fd6e"
    ],
    [
      "p",
      "46fcbe3065eaf1ae7811465924e48923363ff3f526bd6f73d7c184b16bd8ce4d"
    ]
  ],
  "content": "We're working on solving this problem as well. It could be possible to prove that there was no prompt injection/tampering in the middle up to the source. So Routstr nodes cannot screw with user's systems/steal anything. \n\nAlso, PPQ.ai, OpenRouter, Anthropic, all of these in the pipeline is probably spying on you and are vulnerable to the exact same attack vector. If it's not running locally, you should assume that it's not 100% secure is being spied on and have your agents run in sandboxes.",
  "sig": "62e89f53451a0ec138d53adf42149416f5a5e841e99ee6d275612c93acb2980d8dccde423cf0a774d3c7fa37f864223784a0da4a2be1f4257aa552db04a57650"
}