2 Comments
User's avatar
Phil Windley's avatar

That’s precisely the issue I’m addressing. I think the answer is policy guardrails that limit what the agent can do. I don’t claim this is a solved problem by any means. There are still lots of interesting questions. No security is perfect, but where we’ve secured systems in the past it’s been through the application of rules and policies to limit action. I think the same tactic is useful here.