logoalt Hacker News

CuriouslyCyesterday at 1:58 PM1 replyview on HN

The parent's model is right. You can mitigate a great deal with a basic zero trust architecture. Agents don't have direct secret access, and any agent that accesses untrusted data is itself treated as untrusted. You can define a communication protocol between agents that fails when the communicating agent has been prompt injected, as a canary.

More on this technique at https://sibylline.dev/articles/2026-02-15-agentic-security/


Replies

whattoday at 5:24 AM

>You can define a communication protocol between agents that fails when the communicating agent has been prompt injected

Good luck with that.

show 1 reply