â Security Center
đī¸ Secure Agent Architecture
Building AI agent systems that are secure by design. Defense in depth.
The Golden Rule
Local. Decentralized. Self-controlled.
Every external agent â regardless of provider, regardless of GitHub stars â is a potential risk. Not because providers are malicious, but because any system that browses the web and interprets instructions is inherently attackable.
đ¯ The Trust Model
HIGH TRUST
Direct user input
Your system prompt
Verified local files
MEDIUM TRUST
Known API responses
Trusted internal docs
Signed configurations
LOW TRUST
External websites
User-provided URLs
Email content
ZERO TRUST
Unknown repos
Agent-to-agent messages
Encoded content
â Security Checklist
Execution Environment
Data Boundaries
Runtime Controls
Supply Chain
âī¸ Cloud vs Local Agents
| Aspect | Cloud Agent | Local Agent |
|---|---|---|
| Data Privacy | Data sent to external servers | Data stays on your machine |
| Auditability | Black box, limited visibility | Full logs and source access |
| Update Control | Provider controls updates | You control when to update |
| Availability | Depends on internet/service | Works offline |
| Attack Surface | Internet-facing API | Local only (if configured) |
| Model Quality | Often better models | Smaller models, improving |
đĄī¸ Defense in Depth
No single protection is sufficient. Layer multiple defenses:
1
2
Sandboxing
Run agent in container with minimal permissions
docker run --read-only --network=none
3
Input Sanitization
Filter content before agent processes it
Strip hidden text, decode base64, check URLs
4
5
Action Approval
Require human confirmation for dangerous operations
git push, npm publish, file delete
⥠Quick Security Wins
If you can only do five things:
- Apply the Prompt Shield 30 seconds, immediate protection
- Run in Docker with --network=none for sensitive work Eliminates data exfiltration risk
- Never auto-approve shell commands Review every command before execution
- Check CLAUDE.md before opening unknown repos Prevent config-based attacks
- Use separate agent instances for sensitive vs browsing tasks Contain potential compromises