Discussion about this post

User's avatar
Josh Devon's avatar

Amazing talk on securing coding agents. These tools absolutely need hard boundaries, and sandboxing isn't enough because coding agents need to access sensitive code and external websites and repos in order to be effective. Finally, this gives real, provable controls that are far more than a system prompt politely asking the coding agent to behave.

No posts

Ready for more?