Comment by angry_octet
2 hours ago
NixOS is a great place to start from.
Trusted observability will be key. Why am I giving the harness the ability to read/modify files when the harness lives in the same action space as tools? No, the gates should be controlled elsewhere, and even when I have given carte blanche, I want to see what has been done, step by step. So a controlled CA that allows for inspection of requests is great for logging.
No comments yet
Contribute on Hacker News ↗