| ▲ | walterbell 3 hours ago | |
It's technically possible to use 2FA (e.g. TOTP) on the same device as the agent, if appropriate in your threat model. In the scenario you describe, 2FA is enforcing a human-in-the-loop test at organizational boundaries. Removing that test will need an even stronger mechanism to determine when a human is needed within the execution loop, e.g. when making persistent changes or spending money, rather than copying non-restricted data from A to B. | ||