Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Interesting. How are the security filters implemented?


Every system call, file access, net access etc is forced through a local “proxy” where 17 individual filters check what’s going on.

Everything is done locally via our grith cli tool.

Happy to answer any questions on hello@grith.ai too




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: