Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

What's the security boundary here - there's no mention of a VM or anything to isolate the agent from the file system?


i think the point is to access the filesystem. move stuff around write rename etc.




Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: