Problem or use case
We have concerns that users may input PII or API keys, other sensitive material in the prompts when working with an agent on a repo. These then get committed to GitHub through Entire as they materialise in the prompt tracking.
A way to automatically scrub these from the logs/prompt history before committing would be great.
Desired behavior
Proposed solution
No response
Alternatives or workarounds
No response
Problem or use case
We have concerns that users may input PII or API keys, other sensitive material in the prompts when working with an agent on a repo. These then get committed to GitHub through Entire as they materialise in the prompt tracking.
A way to automatically scrub these from the logs/prompt history before committing would be great.
Desired behavior
Proposed solution
No response
Alternatives or workarounds
No response