Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

There's an intermediate step, which is to use a combination of claude code sandboxing (bubblewrap), plus some pre tool hooks to look for sketchy commands, but it's still interactive and probably not the right longterm approach.
 help



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: