Imagine a system were there is no command not found, just a sort of software sculpting system that from a given input and expected output tries to develop a solution for you with a LLM in the background. Security? Fail early, fail loudly. We will miss this weak points..