-
-
Notifications
You must be signed in to change notification settings - Fork 195
Open
Labels
aiarchitectureArchitecture related issuesArchitecture related issuesepicA big time intense ticket with related sub-tasksA big time intense ticket with related sub-tasks
Description
Define and implement the security model for Agent-initiated browser actions.
Scope:
- Capability Taxonomy: Define granular permissions (e.g.,
component:read,component:write,code:load). - Policy Enforcement Point (PEP): Implement middleware in
Neo.ai.server.WebSocketto validate RPC calls against the Agent's capability token. - Sandboxing: Ensure Agents cannot execute arbitrary JavaScript (e.g.,
eval) in the browser context unless explicitly authorized. - Audit Logging: Record all Agent-initiated actions for security review.
- Default Deny: All capabilities require explicit grant.
- Emergency Kill Switch: Ability to revoke agent access immediately.
Reference: .github/AGENT_ARCHITECTURE.md
Metadata
Metadata
Assignees
Labels
aiarchitectureArchitecture related issuesArchitecture related issuesepicA big time intense ticket with related sub-tasksA big time intense ticket with related sub-tasks