Most coding agents today run generated code in the same security context as the agent harness and its secrets, creating serious risks from prompt injection attacks. A framework for thinking about security boundaries in agentic systems identifies four distinct actors—the agent, agent secrets, generated code execution, and the
•9m read time• From vercel.com
Table of contents
All agents are starting to look like coding agentsWhat goes wrong without boundariesFour actors in an agentic systemZero boundaries: today's defaultSecret injection without sandboxingSeparating agent compute from sandbox computeApplication sandbox with secret injectionSort: