| ▲ | devendra116 a day ago | ||||||||||||||||
keyring is one of solution but even substituting values at excution does not gaurantee the security as agents can read the process itself. im building a safe agent execution layer, A runtime where agents can act, but cannot access secrets. kinda sidecar that is callable by agent for using api keys, secrets, private keys, etc and plus one can add policy on how and what a agent can do. does this seems good? | |||||||||||||||||
| ▲ | 10keane a day ago | parent | next [-] | ||||||||||||||||
yah keyring is more for static protection. when the agent process itself is hostile, keyring is kinda obsolete. but then i think the key is that sometimes agent does need access to credentials to be useful - like i will give some credentials to agent such as my browser account access. personally i feel it is not really about preventing agent from accessing credentials, but more to have the supervision layer when agent access it - like you know exactly when and why agent need to access it and you have the ability to deny or approve it. | |||||||||||||||||
| |||||||||||||||||
| ▲ | hadifrt20 a day ago | parent | prev [-] | ||||||||||||||||
[dead] | |||||||||||||||||