top | item 47139060

(no title)

kevincloudsec | 5 days ago

the agent inherits your shell, your env, and your network. encrypting one file doesn't change the trust boundary. the proxy approaches in this thread are closer to the right answer because the agent never holds real credentials at all

discuss

order

No comments yet.