logoalt Hacker News

senkoyesterday at 8:45 PM1 replyview on HN

Article author here. I used trial and error - manual inspection it is.

This took me a few minutes but I feel more in control of what's being exposed and how. The AI recommended just exposing the entire /etc for example. It's probably okay in my case, but I wanted to go more precise.

On the network access part, I let it fully loose (no restrictions, it can access anything). I might want to tighten that in the future (or at least disallow 192.168/16 and 10/8), for now I'm not very concerned.

So there's levels of how tight you want to set it.


Replies

ATechGuyyesterday at 8:52 PM

> I feel more in control of what's being exposed and how

Makes complete sense. Thanks for your insights!