| ▲ | CGamesPlay 2 hours ago | ||||||||||||||||
This looks like what I want. A few questions: is it possible to have a “mayor” type role that has the ability to start other agents, but at the same time be unable to access those secrets or infiltrate prompt data? The key piece I don’t see is the agent needs a tool for klaw itself, and then I have to be able to configure that appropriately. Is there a unified human approval flow, or any kind of UI bundled with this? Maybe I missed this part. | |||||||||||||||||
| ▲ | eftalyurtseven 2 hours ago | parent [-] | ||||||||||||||||
Right now the controller can see secrets across namespaces, so that level of isolation isn’t there yet. It’s on the roadmap though. Namespace-scoped secrets where a controller agent can spawn agents but can’t read their secrets is the right model. No human approval flow yet either, agents create directly. Would you want something like klaw dispatch --approve that queues until a human confirms? | |||||||||||||||||
| |||||||||||||||||