Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

It's worse because they're exposing these features to the kind of people who aren't running agents now.




It literally says in the article:

"This feature is completely optional and is never turned on by default."

Reading the full article this is just a power user feature and in beta at that. I can see where it could be useful and the fact it puts further restrictions on how each agent works mitigates security issues.


For now. Features that are opt-in in developer preview have a way of becoming defaults later.

Fundamentally, having a model that makes it easy to give access to an entire library instead of requiring explicit tight scoping of access to individual files is dangerous and teaches people to make mistakes that can lead to data misuse and leaks.


> For now.

What evidence are you basing that on?

From what I read of the article if it was on by default, it does nothing.

When it's on you get the option to create an agent. That's when you need to be careful.

Even so, the current version is off, it has a big warning about the dangers of using it before and during switching it on.

> that makes it easy to give access to an entire library instead of requiring explicit tight scoping of access to individual files is dangerous

Again from the article, the user literally set the access rights of the agent.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: