| ▲ | CuriouslyC an hour ago | |
The parent's model is right. You can mitigate a great deal with a basic zero trust architecture. Agents don't have direct secret access, and any agent that accesses untrusted data is itself treated as untrusted. You can define a communication protocol between agents that fails when the communicating agent has been prompt injected, as a canary. More on this technique at https://sibylline.dev/articles/2026-02-15-agentic-security/ | ||