Thread

D
Dieter_be11:16 AMOpen in Slack
when using archestra, (e.g. in the archestra-openclaw example docker setup), do you always get the dual-llm-injection-prevention out of the box for every single request?

4 replies
II
Ildar Iskhakov (archestra team)12:11 PMOpen in Slack
The dual LLM is configured separately depending on the use case. Regular static policies are applied by default
D
Dieter_be12:12 PMOpen in Slack
so how does it block injections out of the box?
II
Ildar Iskhakov (archestra team)12:20 PMOpen in Slack
Joey had a write-up with some details how to lock it down
J(
joey (archestra team)2:13 PMOpen in Slack
short answer - you can configure individual tool policies to use the dual-llm approach, it's not enabled for all tools out of the box.
longer answer 👇
This is relevant when the LLM has used the given tool, and Archestra is determining whether or not the results of that tool usage have now exposed the LLM to "untrusted data" (aka tool result policies) - the context being trusted/untrusted has an impact on subsequent tool-calls
You have a few options:
• blanket rules - results for the tool are always trusted (or untrusted)
• deterministic rules - in the example of gmail_getEmails the rule could be something like if contains(data[*].from, "@archestra.ai") then "trusted" (pseudo-rule; see screenshot)
• dual-llm (there's a good explanation here on the details of how this works)