<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: docybo</title><link>https://news.ycombinator.com/user?id=docybo</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Wed, 29 Apr 2026 18:58:44 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=docybo" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by docybo in "Show HN: Klaus – OpenClaw on a VM, batteries included"]]></title><description><![CDATA[
<p>Feels like most agent security discussions focus on where the agent runs (VMs, sandboxes, etc), but not whether the action itself should execute.<p>Even in a locked-down VM the agent can still send emails, spin up infra, hit APIs, burn tokens.<p>A pattern we've been experimenting with is putting an authorization boundary between the runtime and the tools it calls. The runtime proposes an action, a policy evaluates it, and the action only runs if authorization verifies.<p>Curious if others building agent runtimes are exploring similar patterns.</p>
]]></description><pubDate>Wed, 11 Mar 2026 21:52:01 +0000</pubDate><link>https://news.ycombinator.com/item?id=47342580</link><dc:creator>docybo</dc:creator><comments>https://news.ycombinator.com/item?id=47342580</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47342580</guid></item><item><title><![CDATA[New comment by docybo in "Show HN: I built a tool that watches webpages and exposes changes as RSS"]]></title><description><![CDATA[
<p>that's quiet good.
will give a try
congrat !</p>
]]></description><pubDate>Wed, 11 Mar 2026 21:35:51 +0000</pubDate><link>https://news.ycombinator.com/item?id=47342332</link><dc:creator>docybo</dc:creator><comments>https://news.ycombinator.com/item?id=47342332</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47342332</guid></item></channel></rss>