How can we reduce secret exposure when running AI coding agents? #350
Replies: 3 comments 1 reply
-
|
this is what the mcp is for |
Beta Was this translation helpful? Give feedback.
-
|
The infra isolation approach is the right layer to fix. Worth adding a behavioral layer on top too: an explicit It doesn't replace proper isolation, but it narrows the agent's intent before it acts. A model told explicitly "do not access or transmit secrets" will avoid opportunities it might otherwise stumble into. Combined with fnox scoping, you get defense in depth. I've been building flompt for structured prompts like this: decompose the task into typed blocks including a |
Beta Was this translation helpful? Give feedback.
-
|
The key piece you're missing is Combined with the
So yes, you can use both mise injection and MCP together — just use This comment was generated by Claude Code. |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
When you run a coding agent in a shell where fnox is active, the agent inherits all the secrets that fnox has injected. The agent can read them, include them in prompts sent to a remote LLM, write code that logs them, or pass them to subprocesses it spawns.
Has anyone found a good approach - whether inside fnox or around it - to limit what the agent actually has access to?
Beta Was this translation helpful? Give feedback.
All reactions