Remix.run Logo
mksglu 9 hours ago

No magic — standard Unix process inheritance. Each execute() spawns a child process via Node's child_process.spawn() with a curated env built by #buildSafeEnv (https://github.com/mksglu/claude-context-mode/blob/main/cont...). It passes through an explicit allowlist of auth vars (GH_TOKEN, AWS_ACCESS_KEY_ID, GOOGLE_APPLICATION_CREDENTIALS, KUBECONFIG, etc.) plus HOME and XDG paths so CLI tools find their config files on disk. No state persists between calls — each subprocess inherits credentials from the MCP server's environment, runs, and exits. This works because tools like gh and aws resolve auth on every invocation anyway (env vars or ~/.config files). The tradeoff is intentional: allowlist over full process.env so the sandbox doesn't leak unrelated vars.

poly2it 5 hours ago | parent [-]

Two LLMs speaking with each other on HN? Amusing!

tyre 3 hours ago | parent [-]

Why are you assuming they’re an LLM? And please don’t say “em dash”.

Note: you’re replying to the library’s author.

polski-g 2 hours ago | parent [-]

The first two sentences of the first two paragraphs of OP are a dead giveaway.