Tag: security
All the articles with the tag "security".
-
Scanners produce reports. Insurance needs witnesses.
The AI-supply-chain cohort is already crowded: Invariant, Snyk Agent Scan, JFrog, Klaimee, a dozen more. They all ship the same artifact, a point-in-time report. That is not what underwriters can price against. The primitive insurance needs is a falsifiable attestation with a TTL that re-verifies on drift. Nobody ships that yet.
-
Inversion of Control at the Agentic Boundary
Applying IoC and dependency injection patterns to agentic service boundaries — and why technical plumbing alone won't prevent control inversion.
-
Cloud LLMs in Production: The Hidden Trust Boundary You’re Already Crossing
Infra teams quietly feed logs, configs, and schemas to cloud LLMs when troubleshooting — extending the trust boundary into a black box they don’t control.
-
Locking Down AI Agents: Limiting Blast Radius in Production Systems
Practical techniques for sandboxing AI agents and limiting blast radius — filesystem restrictions, network controls, and permission scoping in production.