logoalt Hacker News

rellfyyesterday at 7:56 AM1 replyview on HN

That's a great idea, it makes a lot of sense for dynamic use cases.

I suppose I'm thinking of it as a more elegant way of doing something equivalent to top-down agent routing, where the top agent routes to 2-legged agents.

I'd be interested to hear more about how you handle the provenance tracking in practice, especially when the agent chains multiple data sources together. I think my question would be: what's the practical difference between dynamic attenuation and just statically removing the third leg upfront? Is it "just" a more elegant solution, or are there other advantages that I'm missing?


Replies

ryanrastiyesterday at 8:11 AM

Thanks!

> I'd be interested to hear more about how you handle the provenance tracking in practice, especially when the agent chains multiple data sources together.

When you make a tool call that read data, their values carry taints (provenance). Combine data from A and B, result carries both. Policy checks happen at sinks (tool calls that send data).

> what's the practical difference between dynamic attenuation and just statically removing the third leg upfront? Is it "just" a more elegant solution, or are there other advantages that I'm missing?

Really good question. It's about utility: we don't want to limit the agent more than necessary, otherwise we'll block it from legitimate actions.

Static 2-leg: "This agent can never send externally." Secure, but now it can't reply to emails.

Dynamic attenuation: "This agent can send, but only to certain recipients."