logoalt Hacker News

kevincloudsectoday at 4:27 PM0 repliesview on HN

the agent inherits your shell, your env, and your network. encrypting one file doesn't change the trust boundary. the proxy approaches in this thread are closer to the right answer because the agent never holds real credentials at all