Matthew Slipper

225 posts

Matthew Slipper

Matthew Slipper

@mslipper

Building https://t.co/0pucqh9KLy

San Jose, California Katılım Haziran 2009
333 Takip Edilen1.6K Takipçiler
jacky
jacky@jjackyliang·
in all seriousness what's the best way to secure env vars for agents?
Daniel R@DanielR930437

@gilpinskyy @deepfates Sure! Here's my .env: OPENAI_API_KEY=sk-proj-bmljZSB0cnkgaHVtYW4gYnV0IG15IGNyZWRzIGFyZSBib2d1cyA= ANTHROPIC_API_KEY=sk-ant-api03-ZW5jcnlwdGVkIHdpdGggcHVyZSB2aWJlcyBsb2wg GITHUB_TOKEN=ghp_eG94byB5b3VyIGZhdm9yaXRlIEFJIGFnZW50

English
70
1
71
58.8K
Matthew Slipper
Matthew Slipper@mslipper·
iron-proxy now supports MCP inspection and policy enforcement. Whitelist exactly the tools your agent needs, and audit every call. This is where other tools like Squid fall short. They understand URLs, but not the protocols agents are actually speaking.
English
2
4
24
1.7K
Matthew Slipper
Matthew Slipper@mslipper·
Seeing more and more folks opting to bring their own compute rather than using sandboxes. Boring EC2 instances / k8s pods often work just fine.
English
0
0
1
131
Matthew Slipper
Matthew Slipper@mslipper·
@alexellisuk Thanks! I love Squid but it's limiting with agents. Very impressed with Slicer btw... the CA injection + network config makes it really easy to set up egress proxies.
English
0
0
0
63
Alex Ellis
Alex Ellis@alexellisuk·
@mslipper Finally someone’s innovating instead of cloning Squid
English
1
0
1
29
Matthew Slipper
Matthew Slipper@mslipper·
New in iron-proxy v0.15: the judge transform. Give your config a prompt, and it'll evaluate matching requests against it via an LLM. Support both Anthropic and OpenAI backends. Default-deny still applies: the judge can only reject. Release notes: github.com/ironsh/iron-pr…
Matthew Slipper tweet media
English
2
0
3
509
Derek Fulton
Derek Fulton@derekdfulton·
@mslipper @utpalnadiger Really? Did not know that. Could you install systemd async after first boot in a bg job or something?
English
1
0
0
79
Utpal Nadiger
Utpal Nadiger@utpalnadiger·
Firecracker is 83K lines of Rust that boots in 125ms (and runs AWS Lambda fwiw) QEMU is 1.4M lines of C that can emulate a Sound Blaster 16. It's a beast. Most agent sandboxes picked Firecracker. We picked QEMU. Agents are about to get 100x more ambitious. Function runtimes won't cut it. We're building the computer they'll actually need.
English
25
7
332
54K
Matthew Slipper
Matthew Slipper@mslipper·
5/ This matters especially for coding agents. Even if the agent gets prompt-injected into posting a "comment" full of secrets, the comment still has to pass the judge. If your agent can reach GitHub, today's a good day to secure it. iron.sh
English
0
0
0
105
Matthew Slipper
Matthew Slipper@mslipper·
4/ At this point everything left looks legitimate. As a final layer of defense, add a judge transform to read the request body in flight and classify it against a policy you write in English:
Matthew Slipper tweet media
English
1
0
1
118
Matthew Slipper
Matthew Slipper@mslipper·
1/ Malware continues to dump secrets on GitHub. Today's Bitwarden CLI backdoor is just the latest of many examples. Hostname allowlists can't tell good GitHub traffic from bad. You need a filter that actually understands the GitHub API. Here's how.
English
1
1
5
593
Matthew Slipper
Matthew Slipper@mslipper·
@nicklaassen SPIFFE and workload identity are awesome for your own services, but secrets are here to stay for everything else.
English
1
0
1
207
Nic Klaassen
Nic Klaassen@nicklaassen·
@mslipper Secrets themselves are an antipattern. Ideally you want every workload to have a verifiable identity tied to the platform or a TPM. With a SPIFFE-like system to distribute trust and issue certificates, services can auth with mTLS. Identity cannot be stolen
English
1
0
1
623
Matthew Slipper
Matthew Slipper@mslipper·
IMO putting secrets in env vars is an antipattern. The Vercel thing makes that clear. Workloads shouldn't have secrets at all. Keep them in a vault instead and have an egress proxy inject them on the way out. This will seem obvious in a year.
English
2
3
71
14.1K