<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: dangtony98</title><link>https://news.ycombinator.com/user?id=dangtony98</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Sun, 26 Apr 2026 08:52:03 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=dangtony98" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by dangtony98 in "Show HN: Agent Vault – Open-source credential proxy and vault for agents"]]></title><description><![CDATA[
<p>Yeah this should work in an interface agnostic way so be it that the agent invokes CLI, MCP, SDK, or makes an API call, all traffic is routed through the proxy.<p>That said, there are many DX improvements to be made such as making it easier to load in credentials into AV and more thinking more around how to optimally handle token refreshes. Part of the questioning there is how much work should be delegated to AV and how much should be to the underlying secrets manager (if connected).</p>
]]></description><pubDate>Sat, 25 Apr 2026 17:14:19 +0000</pubDate><link>https://news.ycombinator.com/item?id=47902940</link><dc:creator>dangtony98</dc:creator><comments>https://news.ycombinator.com/item?id=47902940</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47902940</guid></item><item><title><![CDATA[New comment by dangtony98 in "Show HN: Agent Vault – Open-source credential proxy and vault for agents"]]></title><description><![CDATA[
<p>The sandboxed agent and AV should <i>ideally</i> not run on the same host because if it did then you're right that a sufficiently sophisticated agent like Mythos could try to reverse engineer and like find kernel exploits to gain access AV credentials.<p>For this reason, you'd want to keep the two separate; we have some ideas in the works for that atm but largely still experimental.</p>
]]></description><pubDate>Fri, 24 Apr 2026 21:11:59 +0000</pubDate><link>https://news.ycombinator.com/item?id=47895871</link><dc:creator>dangtony98</dc:creator><comments>https://news.ycombinator.com/item?id=47895871</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47895871</guid></item><item><title><![CDATA[New comment by dangtony98 in "Show HN: Agent Vault – Open-source credential proxy and vault for agents"]]></title><description><![CDATA[
<p>This would be deployed separately but in close proximity to your sandboxes. You'd want to add network restrictions around sandboxes to only allow outbound requests to AV.<p>You'd add HTTPS_PROXY to your sandbox environment and pre-configure it to trust the AV CA.</p>
]]></description><pubDate>Fri, 24 Apr 2026 21:05:38 +0000</pubDate><link>https://news.ycombinator.com/item?id=47895806</link><dc:creator>dangtony98</dc:creator><comments>https://news.ycombinator.com/item?id=47895806</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47895806</guid></item><item><title><![CDATA[New comment by dangtony98 in "Show HN: Agent Vault – Open-source credential proxy and vault for agents"]]></title><description><![CDATA[
<p>What attack vector are you thinking? Could you elaborate more.<p>Would love to explore this train of thought and what we can do about it.</p>
]]></description><pubDate>Fri, 24 Apr 2026 21:02:44 +0000</pubDate><link>https://news.ycombinator.com/item?id=47895775</link><dc:creator>dangtony98</dc:creator><comments>https://news.ycombinator.com/item?id=47895775</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47895775</guid></item><item><title><![CDATA[New comment by dangtony98 in "Show HN: Agent Vault – Open-source credential proxy and vault for agents"]]></title><description><![CDATA[
<p>Yup! I think the terminologies we're going to be seeing more and more of are "credential exfiltration" and conversely "credential brokering" as a solution to that.</p>
]]></description><pubDate>Fri, 24 Apr 2026 21:00:45 +0000</pubDate><link>https://news.ycombinator.com/item?id=47895751</link><dc:creator>dangtony98</dc:creator><comments>https://news.ycombinator.com/item?id=47895751</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47895751</guid></item><item><title><![CDATA[New comment by dangtony98 in "Show HN: Agent Vault – Open-source credential proxy and vault for agents"]]></title><description><![CDATA[
<p>Not yet for both but this would definitely be on the roadmap; especially the credential stripping portion.<p>For AV to be really useful, it'd have to support more protocols but we think this first implementation makes a move in the right direction.</p>
]]></description><pubDate>Fri, 24 Apr 2026 21:00:07 +0000</pubDate><link>https://news.ycombinator.com/item?id=47895740</link><dc:creator>dangtony98</dc:creator><comments>https://news.ycombinator.com/item?id=47895740</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47895740</guid></item><item><title><![CDATA[New comment by dangtony98 in "Show HN: Agent Vault – Open-source credential proxy and vault for agents"]]></title><description><![CDATA[
<p>Thanks for this feedback! Will keep in mind all of these points as we iterate on Agent Vault.<p>We're pretty swarmed on requests at the moment but I've noted these down as improvements to AV; it's a work in progress, we'll be molding it into the right shape over the next few months.<p>A few thoughts for each of the above:<p>1. AV doesn't consider OAuth2 tokens atm but this is definitely a next step.<p>2. Agree which is why there is a "passthrough" mode; for each endpoint, you need to explicitly specify what credential is used for it.<p>3. That's correct. This is a MITM architecture with credential brokering capabilities added on top.<p>4. Agree. The idea here is that AV can function both as a proxy and vault but in a true production setting, it should pull credentials from a secure secrets store like Infisical. This way credentials cached in memory in AV can even be made ephemeral.<p>Great observations all around and we have plans for them :)</p>
]]></description><pubDate>Fri, 24 Apr 2026 20:57:37 +0000</pubDate><link>https://news.ycombinator.com/item?id=47895700</link><dc:creator>dangtony98</dc:creator><comments>https://news.ycombinator.com/item?id=47895700</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47895700</guid></item><item><title><![CDATA[New comment by dangtony98 in "Show HN: Agent Vault – Open-source credential proxy and vault for agents"]]></title><description><![CDATA[
<p>Hey! Yeah I think there's overlapping functionality for sure, and you're spot on on people looking at it from different angles.<p>The "connectors angle" is something we thought about as well and we built a whole product line around that called Agent Sentinel (I'll link that below). We weren't convinced, however, that enterprises were ready for this and instead took it back to our infra roots (Infisical is a security infra platform) and started simple with the problem: credential exfiltration. This thinking does lead to two different kinds of products though with one naturally becoming an infrastructure component; this makes much more sense for us at Infisical to work on.<p><a href="https://infisical.com/docs/documentation/platform/agent-sentinel/overview">https://infisical.com/docs/documentation/platform/agent-sent...</a></p>
]]></description><pubDate>Fri, 24 Apr 2026 20:40:26 +0000</pubDate><link>https://news.ycombinator.com/item?id=47895475</link><dc:creator>dangtony98</dc:creator><comments>https://news.ycombinator.com/item?id=47895475</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47895475</guid></item><item><title><![CDATA[New comment by dangtony98 in "Show HN: Agent Vault – Open-source credential proxy and vault for agents"]]></title><description><![CDATA[
<p>Yup it turns out many teams building their own custom agents end up stitching together their own solutions for this problem.<p>What we thought was basically: If everyone is making some version of this egress proxy, maybe we're actually missing a new infrastructure component that does not yet exist in a mainstream way for this use case. The form factor of this was very important in the design of it since it needed to fit in with the tools and workflows that agents are already using today.<p>Definitely regarding the domain-based allowlist and this is part of how it currently works. As an egress proxy it basically functions as a firewall and we intend to extend it with more capabilities that'll make it more useful.</p>
]]></description><pubDate>Fri, 24 Apr 2026 20:35:28 +0000</pubDate><link>https://news.ycombinator.com/item?id=47895419</link><dc:creator>dangtony98</dc:creator><comments>https://news.ycombinator.com/item?id=47895419</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47895419</guid></item><item><title><![CDATA[New comment by dangtony98 in "Show HN: Agent Vault – Open-source credential proxy and vault for agents"]]></title><description><![CDATA[
<p>Agent Vault should remain in close proximity to the sandboxed agent and not be exposed to the public internet; your standard network security controls apply.<p>The proxy itself currently implements a token-based auth scheme. Depending on your setup, you can have an orchestrator mint an ephemeral token to be passed to a sandboxed agent to authenticate with the proxy.</p>
]]></description><pubDate>Fri, 24 Apr 2026 03:09:38 +0000</pubDate><link>https://news.ycombinator.com/item?id=47885026</link><dc:creator>dangtony98</dc:creator><comments>https://news.ycombinator.com/item?id=47885026</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47885026</guid></item><item><title><![CDATA[New comment by dangtony98 in "Show HN: Agent Vault – Open-source credential proxy and vault for agents"]]></title><description><![CDATA[
<p>We're still in the early innings of credential brokering so there'll be a lot of overlap but I expect the way the tool evolves will start to diverge a lot since we are thinking very infra-workflow first.<p>See my other comment regarding an example of this.</p>
]]></description><pubDate>Fri, 24 Apr 2026 01:39:58 +0000</pubDate><link>https://news.ycombinator.com/item?id=47884502</link><dc:creator>dangtony98</dc:creator><comments>https://news.ycombinator.com/item?id=47884502</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47884502</guid></item><item><title><![CDATA[New comment by dangtony98 in "Show HN: Agent Vault – Open-source credential proxy and vault for agents"]]></title><description><![CDATA[
<p>Can you please elaborate on the agent signing up for a service piece? I'm curious to understand the use case more (type of agent, what credit, etc.).<p>The current modal assumes that you have a trusted entity whose able to save credentials to Agent Vault; that entity is likely not the agent itself because that would mean that the agent would have access to credentials. The agent is then simply configured to proxy requests through AV which attaches credentials at this proxy layer. Here are two examples:<p>Example 1:<p>- You have a backend that saves an API Key to AV for a specific vault and defines the service rules for how that credential can be used.<p>- That same backend mints a session-scoped token to AV and invokes the creation of a pre-configured sandbox, passing that token into it.<p>- The agent in the sandbox does what it needs to do, requests fully proxied through AV.<p>Example 2:<p>- A human operator manually goes into AV and adds an API Key.<p>- The human operator spins up an agent (could be an OpenClaw, Claude Code, etc.) in a pre-configured environment to route requests through AV. This can be done using non-cooperative sandbox mode with the AV CLI or through more manual configuration.<p>- The agent does what it needs to do, requests fully proxied through AV.<p>We're still working on smoothening it out but perhaps this gives you a better idea of how this might work.<p>AV does have a permission system that supports agents being able to save credentials to it and then subsequently using the proxy (maybe this is what you're targeting) but this isn't the use case that I've personally explored at much; definitely worth looking into tho.</p>
]]></description><pubDate>Fri, 24 Apr 2026 01:36:55 +0000</pubDate><link>https://news.ycombinator.com/item?id=47884480</link><dc:creator>dangtony98</dc:creator><comments>https://news.ycombinator.com/item?id=47884480</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47884480</guid></item><item><title><![CDATA[New comment by dangtony98 in "Show HN: Agent Vault – Open-source credential proxy and vault for agents"]]></title><description><![CDATA[
<p>I haven't used executor.sh but this seems to operate at a different layer from Agent Vault.<p>From what I'm seeing, executor.sh is an integration and execution layer for agents. Where Agent Vault shines is that it fits right into the tools and workflows that your agents are already using in an interface-agnostic way: API, CLI, SDK, MCP.<p>Put differently, the MITM architecture of Agent Vault (operates more at the network‑layer) allows the sandboxed agent can do whatever it would've done normally, just all routed through AV - the agent is <i>basically</i> proxy unaware.</p>
]]></description><pubDate>Fri, 24 Apr 2026 01:20:43 +0000</pubDate><link>https://news.ycombinator.com/item?id=47884389</link><dc:creator>dangtony98</dc:creator><comments>https://news.ycombinator.com/item?id=47884389</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47884389</guid></item><item><title><![CDATA[New comment by dangtony98 in "Show HN: Agent Vault – Open-source credential proxy and vault for agents"]]></title><description><![CDATA[
<p>I'm so glad you mentioned the non-cooperate sandbox! Did you get a chance to try it out?<p>This is something that we're going to be improving significantly in the next week including the ergonomics of it since the current state of this feature does not yet make it practical enough to be used by developers in a mainstream kind of way; the ergonomics are so important for a devtool.<p>But yes credential brokering is what the industry seems to be converging on as a solution for how we might prevent credential exfiltration; the egress proxy is increasingly becoming a common pattern in the agent stack based on some of the conversations we've had with AI-forward companies.</p>
]]></description><pubDate>Fri, 24 Apr 2026 00:57:37 +0000</pubDate><link>https://news.ycombinator.com/item?id=47884229</link><dc:creator>dangtony98</dc:creator><comments>https://news.ycombinator.com/item?id=47884229</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47884229</guid></item><item><title><![CDATA[New comment by dangtony98 in "Show HN: Agent Vault – Open-source credential proxy and vault for agents"]]></title><description><![CDATA[
<p>To be honest, I haven't used OneCLI personally before so I can't speak to it in detail but Agent Vault does take a similar approach with the MITM architecture and setting HTTPS_PROXY in the agent's environment to route traffic through the proxy; we feel like this is the right approach in terms of interface-agnostic ergonomics given that agents may interact with upstream services thru a number of means: API, CLI, SDK, MCP, etc.<p>Since we are in the beginnings of Agent Vault (AV), I wouldn't be surprised if there were many similarities. That said, AV likely takes a different approach with how its core primitives behave (e.g. define specific services along with how their auth schemes work) and is specifically designed in an infra-forward way that also considers agents as first class citizens.<p>When designing AV, we think a lot about the workflows that you might encounter, for instance, if you're designing a custom sandboxed agent; maybe you have a trusted orchestrator that needs to update credentials in AV and authenticate with it using workload identity in order to mint a short-lived token to be passed into a sandbox for an agent - this is possible. I suspect that how we think about the logical design starting from an infra standpoint will over time create two different experiences for a proxy.<p>If I understand correctly regarding credential stripping then yes. The idea is that you set the credentials in Agent Vault and define which services should be allowed through it, including the authentication method (e.g. Bearer token) to be used together with which credential.<p>We don't have plans yet to integrate with Bitwarden at this time but this could be something worth looking into at some point. We definitely would like to give Agent Vault first-class support for Infisical as a storage for credentials (this way you'd get all the benefits of secrets rotation, dynamic secrets, point in time recovery, secret versioning, etc. that already come with it).</p>
]]></description><pubDate>Fri, 24 Apr 2026 00:50:20 +0000</pubDate><link>https://news.ycombinator.com/item?id=47884189</link><dc:creator>dangtony98</dc:creator><comments>https://news.ycombinator.com/item?id=47884189</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47884189</guid></item><item><title><![CDATA[New comment by dangtony98 in "Show HN: Agent Vault – Open-source credential proxy and vault for agents"]]></title><description><![CDATA[
<p>Hey! At the moment Agent Vault doesn't address the identity piece.<p>The identity piece would be the next logical step at some point likely after we figure out the optimal ergonomics for deploying and integrating AV into different infrastructure / agent use cases first.<p>We actually work a lot with identity at Infisical (anything from workload identity to X.509 certificates) and had considered tackling the identity problem for agents as well but it felt like it required an ecosystem-wide change with many more considerations to it including protocols like A2A. The most immediate problem being credential exfiltration seemed like the right place to start since we have a lot of experience with secrets management.</p>
]]></description><pubDate>Fri, 24 Apr 2026 00:12:53 +0000</pubDate><link>https://news.ycombinator.com/item?id=47883917</link><dc:creator>dangtony98</dc:creator><comments>https://news.ycombinator.com/item?id=47883917</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47883917</guid></item><item><title><![CDATA[New comment by dangtony98 in "Show HN: Agent Vault – Open-source credential proxy and vault for agents"]]></title><description><![CDATA[
<p>Thank you! Me too - very excited to see where this goes :)</p>
]]></description><pubDate>Thu, 23 Apr 2026 22:18:40 +0000</pubDate><link>https://news.ycombinator.com/item?id=47882903</link><dc:creator>dangtony98</dc:creator><comments>https://news.ycombinator.com/item?id=47882903</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47882903</guid></item><item><title><![CDATA[New comment by dangtony98 in "Show HN: Agent Vault – Open-source credential proxy and vault for agents"]]></title><description><![CDATA[
<p>T from Infisical here - Also forgot to mention that this is a research preview launch for Agent Vault and should be treated as such - experimental <<<p>Since the project is in active development, the form factor including API is unstable but I think it gives a good first glance into how we're thinking about secrets management for AI agents; we made some interesting architectural decisions along the way to get here, and I think this is generally on the right track with how the industry is thinking about solving credential exfiltration: thru credential brokering.<p>We'd appreciate any feedback; feel free also to raise issues, and contribute - this is very much welcome :)</p>
]]></description><pubDate>Thu, 23 Apr 2026 22:17:10 +0000</pubDate><link>https://news.ycombinator.com/item?id=47882886</link><dc:creator>dangtony98</dc:creator><comments>https://news.ycombinator.com/item?id=47882886</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47882886</guid></item><item><title><![CDATA[New comment by dangtony98 in "Show HN: Agent Vault – Open-source credential proxy and vault for agents"]]></title><description><![CDATA[
<p>We'll be releasing a closer integration between Agent Vault and Infisical in the coming 1-2 weeks!<p>The way we see it is that you'd still need to centrally store/manage secrets from a vault; this part isn't going anywhere and should still deliver secrets to the rest of your workloads.<p>The part that's new is Agent Vault which is really a delivery mechanism to help agents use secrets in a way that they don't get leaked. So, it would be natural to integrate the two.<p>This is definitely on the roadmap!</p>
]]></description><pubDate>Thu, 23 Apr 2026 15:43:52 +0000</pubDate><link>https://news.ycombinator.com/item?id=47877127</link><dc:creator>dangtony98</dc:creator><comments>https://news.ycombinator.com/item?id=47877127</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47877127</guid></item><item><title><![CDATA[New comment by dangtony98 in "Open Source Credential Proxy and Vault for Agents"]]></title><description><![CDATA[
<p>It prevents a compromised agent from seeing the secret. There are two different but related problems here: credential exfiltration and data exfiltration.<p>The problem that Agent Vault (AV) solves is the former while the latter requires more guardrails beyond the scope of AV.<p>In the event that an agent is compromised, are you are at least able to revoke its access since request/data flow runs through AV; the malicious actor does not get any credentials.<p>Now if the attacker was to obtain credentials in the first place, you'd be stuck chasing down hundreds, if not thousands, of secrets especially if the agent was part of a multi-tenant system doing things on behalf of users.</p>
]]></description><pubDate>Thu, 23 Apr 2026 15:00:42 +0000</pubDate><link>https://news.ycombinator.com/item?id=47876545</link><dc:creator>dangtony98</dc:creator><comments>https://news.ycombinator.com/item?id=47876545</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47876545</guid></item></channel></rss>