logoalt Hacker News

hardsnowtoday at 6:31 AM4 repliesview on HN

Alternative, and more robust approach is to give the agent surrogate credentials and replace them on the way out in a proxy. If proxy runs in an environment to which agent has no access to, the real secrets are not available to it directly; it can only make requests to scoped hosts with those.

I’ve built this in Airut and so far seems to handle all the common cases (GitHub, Anthropic / Google API keys, and even AWS, which requires slightly more work due to the request signing approach). Described in more detail here: https://github.com/airutorg/airut/blob/main/doc/network-sand...


Replies

sesmtoday at 11:13 AM

That's great for API credentials but some secrets are ment for local use, like encryption keys.

ctmnttoday at 4:33 PM

OP isn't talking about giving agents credentials, that's a whole nother can of worms. And yes, agreed, don't do it. Some kind of additional layer is crucial.

Personally I don't like the proxy / MITM approach for that, because you're adding an additional layer of surface area for problems to arise and attacks to occur. That code has to be written and maintained somewhere, and then you're back to the original problem.

NitpickLawyertoday at 7:22 AM

How does this work with SSL? Do you need to provision certs on the agent VM?

show 1 reply
petesergeanttoday at 11:17 AM

This is cool! Solving the same problem (authority delegation to resources like Github and Gmail) but in a slightly different way at https://agentblocks.ai