Comment by nulone
1 day ago
Makes sense — execution boundary is the right place.
I'd prioritize audit logs + correlation IDs, and short-lived creds per tool call. Do you expose tool capabilities to the planner without exposing creds?
1 day ago
Makes sense — execution boundary is the right place.
I'd prioritize audit logs + correlation IDs, and short-lived creds per tool call. Do you expose tool capabilities to the planner without exposing creds?
No comments yet
Contribute on Hacker News ↗