| ▲ | Agent - Native Mac OS X coding ide/harness(github.com) | |||||||||||||||||||
| 37 points by jv22222 6 hours ago | 6 comments | ||||||||||||||||||||
| ▲ | moonlighter 3 hours ago | parent | next [-] | |||||||||||||||||||
Would love to be able to use this with my Claude Max Plan subscription ($100/month)... not going to pay with an API Key which burns through tokens way faster. Might try it for the local Apple Intelligence and accessibility to drive local apps tho. | ||||||||||||||||||||
| ▲ | foreman_ an hour ago | parent | prev | next [-] | |||||||||||||||||||
The XPC architecture is the right call for privilege separation … it’s what makes sandboxing trustworthy on macOS rather than just advisory. I’m really curious how it handles the trust boundary between LLM responses and the XPC service layer. The most obvious attack surface is prompt injection via a document the agent reads, which then instructs it to do something in Safari or Messages that the user wouldn’t normally sanction. XPC gives you OS-enforced process isolation but doesn’t help you if the privileged process is faithfully executing a poisoned instruction. What’s the current model for distinguishing user intent from “content the agent read”? Is it purely the system prompt guidance, or is there something structural? Thanks for posting. | ||||||||||||||||||||
| ▲ | danpalmer 3 hours ago | parent | prev [-] | |||||||||||||||||||
> Our Founder! of this project is battling cancer. Your Stars and Forks are appreciated. I'm sorry to hear this, but I'm also surprised that this is the first thing I learnt about this project, and that it is written in the third person. It detracts from the project. | ||||||||||||||||||||
| ||||||||||||||||||||