logoalt Hacker News

philipwhiuk01/16/20261 replyview on HN

What's the security boundary here - there's no mention of a VM or anything to isolate the agent from the file system?


Replies

mhyatt00001/24/2026

i think the point is to access the filesystem. move stuff around write rename etc.