▲ | cddotdotslash 3 days ago | |||||||||||||||||||||||||
I can see the value, but to do the things you're describing, the AI needs to be given fairly highly-privileged credentials. > Right now, Datafruit receives read-only access to your infrastructure > "Grant @User write access to analytics S3 bucket for 24 hours" > -> Creates temporary IAM role, sends least-privilege credentials, auto-revokes tomorrow These statements directly conflict with one another. So it needs "iam:CreateRole," "iam:AttachPolicy," and other similar permissions. Those are not "read-only." And, they make it effectively admin in the account. What safeguards are in place to make sure it doesn't delete other roles, or make production-impacting changes? | ||||||||||||||||||||||||||
▲ | nickpapciak 3 days ago | parent [-] | |||||||||||||||||||||||||
Ahh. To clarify, changes like granting users access would be done by our agent modifying IaC, so you would still have to manually apply the changes. Every potentially destructive change being an IaC change helps allow the humans to always stay in the loop. This admittedly makes the agents a little more annoying to work with, but safer. | ||||||||||||||||||||||||||
|