Este contenido no está disponible en el idioma seleccionado.
Chapter 8. Frequently asked questions about user data security
What system information can the command-line assistant directly access?
The command-line assistant cannot directly access information from your system. For example, if you ask the command-line assistant a question such as "how much free memory does this system have?", the command-line assistant cannot directly gather this information from the system. Instead, the command-line assistant can help you find a command to display how much free memory the system has. You can provide information to the command-line assistant by using various methods, such as the following:
- Including the information in the prompt or question
-
Attaching a file to the command-line assistant with the
--attachmentoption - By using a shell pipeline to pass output from a command to the command-line assistant
-
By using the
--with-outputoption.
What is the process flow for input and output in the command-line assistant?
The command-line assistant receives your question as an input.
Command line-assistant logs and stores complete transcripts of conversations that users have with the command-line assistant. This includes the following information:
- Queries from the user.
- The complete message is sent to the configured Large Language Model (LLM) provider, which includes system instructions, referenced documentation, and the user question.
- The complete response from the LLM provider.
- The input is processed by the backend.
- The command-line assistant searches for relevant knowledge related to your query.
- The command-line assistant takes your query, relevant knowledge, and other instructions and sends for AI inference.
- You receive an output from the command-line assistant as a response.
The command-line assistant is not intended to process personal information, and you agree to not include any personal information in the input.
Note that the interactions that you have with the command-line assistant are logged locally on your system so that you can have access to your chat history. Those interactions are also logged on the service, and may be used to improve Red Hat’s products or services.