We're working on solving this problem as well. It could be p...

npub1ftt05tgku25m2akgvw6v7aqy5ux5mseqcrzy05g26ml43xf74nyqsredsh
hex
5342eb98c4bb021e73424e948f0253ecc0e816e43a7616136d5d06a62ef4d282nevent
nevent1qqs9xshtnrztkqs7wdpya9y0qff7es8gzmjr5askzdk46p4x9m6d9qsprpmhxue69uhhyetvv9ujuem4d36kwatvw5hx6mm9qgsy44h695tw92d4wmyx8dx0wsz2wr2dcvsvp3z86y9ddl6cnyl2ejqvw32cyKind-1 (TextNote)
↳ 回复 Leo Wandersleb (npub1gm7tuvr9atc6u7q3gevjfeyfyvmrlul4y67k7u7hcxztz67ceexs078rf6)
The concern is legit. Don't get offended. Especially getting in between for spying is certainly an underappreciated concern.
We're working on solving this problem as well. It could be possible to prove that there was no prompt injection/tampering in the middle up to the source. So Routstr nodes cannot screw with user's systems/steal anything.
Also, PPQ.ai, OpenRouter, Anthropic, all of these in the pipeline is probably spying on you and are vulnerable to the exact same attack vector. If it's not running locally, you should assume that it's not 100% secure is being spied on and have your agents run in sandboxes.
原始 JSON
{
"kind": 1,
"id": "5342eb98c4bb021e73424e948f0253ecc0e816e43a7616136d5d06a62ef4d282",
"pubkey": "4ad6fa2d16e2a9b576c863b4cf7404a70d4dc320c0c447d10ad6ff58993eacc8",
"created_at": 1777810769,
"tags": [
[
"e",
"b65a21d7d19bcb960876ad5cd6649da827f09f4056fba0e1ca2d0cc77907a4fd",
"wss://nostr.wine/",
"root",
"f985d309197c805e1719c73185b574fc3ee407d7c1b6157dee99c6ace2599bbb"
],
[
"e",
"5130c94eb2dc43cbbed7a7afd5479910b59b9e2f74ebcee2a423d713c38bb63f",
"wss://relay.primal.net/",
"reply",
"46fcbe3065eaf1ae7811465924e48923363ff3f526bd6f73d7c184b16bd8ce4d"
],
[
"p",
"8bf629b3d519a0f8a8390137a445c0eb2f5f2b4a8ed71151de898051e8006f13"
],
[
"p",
"2efaa715bbb46dd5be6b7da8d7700266d11674b913b8178addb5c2e63d987331"
],
[
"p",
"f985d309197c805e1719c73185b574fc3ee407d7c1b6157dee99c6ace2599bbb"
],
[
"p",
"d22bcdb1d2505bc060f65a86cd5f20532ec5f3e41c06aea9edac39f6ba76fd6e"
],
[
"p",
"46fcbe3065eaf1ae7811465924e48923363ff3f526bd6f73d7c184b16bd8ce4d"
]
],
"content": "We're working on solving this problem as well. It could be possible to prove that there was no prompt injection/tampering in the middle up to the source. So Routstr nodes cannot screw with user's systems/steal anything. \n\nAlso, PPQ.ai, OpenRouter, Anthropic, all of these in the pipeline is probably spying on you and are vulnerable to the exact same attack vector. If it's not running locally, you should assume that it's not 100% secure is being spied on and have your agents run in sandboxes.",
"sig": "62e89f53451a0ec138d53adf42149416f5a5e841e99ee6d275612c93acb2980d8dccde423cf0a774d3c7fa37f864223784a0da4a2be1f4257aa552db04a57650"
}