Great guide and great write-up! Thank you for this and for sharing it with the community.

I know this guide is centered around connecting an Assistant and not around endpoint security, but i feel its still important to put a note that the endpoints need to be secured somehow. Creating a public endpoint that can run without authentication and also ignores privacy rules is a big vulnerability, especially if they create/return data.

You don’t need to talk about how to actually secure the endpoint - just leave a short disclaimer that something needs to be done but its outside the scope of the guide :blush:

3 Likes