Discussion about this post

User's avatar
Adrian Gropper, MD's avatar

OpenClaw is useful as a concept, particularly as we need to scale tools and protocols, but it's almost irrelevant to the real issues of privacy and security.

Running a deterministic authorization server with a Cedar policy store is step 1 - a given.

Using various LLMs to write and to analyze the Cedar policies is step 2 - also a given.

But the context for the LLM that writes the policies in step 2 is a combination of two kinds of inputs:

a - documents describing the resource (home, health record, accounts...) to be protected, and

b - documents describing authorization requests (goals, credentials, threats)

Combining a + b into a context for step 2 benefits from embeddings because that, almost by definition, introduces some clarity into the scoping issues that need to be captured in the policy store.

The embeddings themselves are based on combination of deterministic chunking of the documents a and b as well as an LLM to create the embeddings as an index.

I'm looking for insights that address this core issue. My demonstration is private, personal agents that authorize access to health records.

Naveen Siddareddy's avatar

Great piece. If Cedar handles the mathematical certainty of the policy, what are your thoughts on using an FPGA and a bare-metal token (like a TKey) to handle the physical determinism? We're currently piping Cedar policies as triggers on graph engine but planning to move execution to FPGA/TKey to avoid OS hacks.. this can be more like car key

2 more comments...

No posts

Ready for more?