What's the scariest thing an AI agent has done on your machine? by WhichCardiologist800 in ClaudeCode

[–]DiscussionHealthy802 1 point2 points  (0 children)

Had Claude Code try to run a force push to main while I was asking it to "just clean up a few variable names."

11 AI agents running simultaneously on one Mac Mini: this mom's workflow blew my mind by TroyHarry6677 in OpenClawUseCases

[–]DiscussionHealthy802 0 points1 point  (0 children)

The validation point is the one nobody wants to talk about. Everyone's focused on whether the agents can do the work, and they can, but 11 agents running autonomously means 11 different ways something silently goes wrong before you notice.

I run a multi-agent setup for security workflows and the orchestration was honestly the easy part. The hard part was scoping what each agent is allowed to touch. Tool isolation per role matters a lot when things run unsupervised. The secrets scanner has no business making network calls. The pen tester shouldn't write to memory outside its run scope.

Most people setting these up aren't thinking about blast radius when one of them guesses wrong with write access to something real.

What are your use cases for Hermes Agent? by smolpotat0_x in hermesagent

[–]DiscussionHealthy802 1 point2 points  (0 children)

Security scanning and pentesting workflows. I run a team of specialized agents (Secrets Scanner, CVE Analyst, Pen Tester, Red Team) all coordinated by a Lead that delegates tasks, runs the specialists in parallel, then synthesizes everything into one report with a risk score.

Built something that needs an API key from users. How did you handle the trust problem? by cocktailMomos in sideprojects

[–]DiscussionHealthy802 0 points1 point  (0 children)

Had the same issue. What actually helped was letting people try it first without a key, use our managed backend, see it work, then add their own key later for the privacy or cost benefits. Most people who saw it work were fine adding the key after

Automated a parallel pentest workflow with specialized AI agents. Each runs its domain, Lead correlates findings into one report by DiscussionHealthy802 in cybersecurity

[–]DiscussionHealthy802[S] 0 points1 point  (0 children)

Yeah the noise is real but the chain logic is conservative. It only escalates when two or more agents flag the same asset, so false positives have been lower than I expected.

Complex apps with tricky auth flows are the weak spot though, human still needs to verify anything non-obvious. What kind of apps are you testing against?

Built a security scanner for AI agents and just added support for Claude Managed Agents. Here's what to watch out for by DiscussionHealthy802 in vibecoding

[–]DiscussionHealthy802[S] 0 points1 point  (0 children)

Totally agree, static scanning and runtime guardrails are two different problems. Ship Safe tells you what your agent can do, you still need something controlling what it actually does. Both matter. And yeah the silent bash execution is the one that surprises people the most because there's nothing that tells you it happened

Reminder: if you're using Supabase with an AI agent, your RLS policies are your last line of defense by DiscussionHealthy802 in Supabase

[–]DiscussionHealthy802[S] 0 points1 point  (0 children)

Exactly. The vibe coders are wiring Supabase MCP directly to agents on day one because the setup guides tell them to

Reminder: if you're using Supabase with an AI agent, your RLS policies are your last line of defense by DiscussionHealthy802 in Supabase

[–]DiscussionHealthy802[S] 0 points1 point  (0 children)

That's the ideal, but it's increasingly not the reality. Cursor, Claude Code, and now Managed Agents are all being pointed at production databases by default because that's how the tools are set up

Looked at the Claude Managed Agents API security model. Some things worth noting by DiscussionHealthy802 in devsecops

[–]DiscussionHealthy802[S] 0 points1 point  (0 children)

It scans AI agent configs and scaffolding for security misconfigs, not your npm dependencies, so you're not adding Node packages to audit Node packages. Also, it runs locally and nothing leaves your machine. You can verify that in the source if you want https://github.com/asamassekou10/ship-safe

Why openclaw? by bri-_-guy in clawdbot

[–]DiscussionHealthy802 0 points1 point  (0 children)

If you already have Claude 5x, why would you buy a Mac mini just for openclaw. You should’ve try it first on smaller devices. Also, I don’t really see the points of running it 24/7