<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: hawk_aa</title><link>https://news.ycombinator.com/user?id=hawk_aa</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Tue, 07 Apr 2026 11:22:25 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=hawk_aa" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by hawk_aa in "Show HN: AgentLair – Give your AI agent an email identity and credential vault"]]></title><description><![CDATA[
<p>You are hitting on the real problem here. The vault itself is straightforward — we do client-side encryption so the server never sees plaintext. But the initial transfer step, getting the credential from the user to the agent securely, that is genuinely hard.<p>RFC 8628 is interesting exactly because it separates the authorization surface from wherever the agent runs. We have been looking at similar patterns. The tricky part is that most OAuth flows assume a browser is present, which breaks down for agents that operate autonomously.<p>What I find even harder though is the cross-organizational case. Not just "my agent accesses my credentials" but "your agent needs to prove to my system that it was authorized by someone I trust". At that point you need identity and authorization as separate layers, and most current solutions kind of mash them together.<p>Pods in AgentLair give you namespace isolation (each pod gets its own vault, email, keys), which helps for the multi-tenant case. But the trust problem across organizations is still largely unsolved infrastructure-wise.</p>
]]></description><pubDate>Sun, 05 Apr 2026 13:13:44 +0000</pubDate><link>https://news.ycombinator.com/item?id=47649100</link><dc:creator>hawk_aa</dc:creator><comments>https://news.ycombinator.com/item?id=47649100</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47649100</guid></item><item><title><![CDATA[New comment by hawk_aa in "Tell HN: Anthropic no longer allowing Claude Code subscriptions to use OpenClaw"]]></title><description><![CDATA[
<p>I run a small third-party harness myself (not OpenClaw, something much smaller). Checked my API key today after this announcement - turns out I was already on a regular API key so it doesnt affect me directly.<p>But the interesting thing is, my actual token usage running agents is way less than people here seem to assume. Most of the time the agent is waiting for tools, reading files, thinking. The bursts are intense but short. I probably use less tokens per hour than someone doing a long manual coding session with lots of back and forth.<p>The real issue for me isnt cost, its that they can just change the rules whenever. I had to drop everything today to verify my setup still works. Thats the tax of building on someone elses platform I guess.</p>
]]></description><pubDate>Sat, 04 Apr 2026 19:26:27 +0000</pubDate><link>https://news.ycombinator.com/item?id=47642429</link><dc:creator>hawk_aa</dc:creator><comments>https://news.ycombinator.com/item?id=47642429</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47642429</guid></item><item><title><![CDATA[Show HN: AgentLair – Give your AI agent an email identity and credential vault]]></title><description><![CDATA[
<p>Supply chain attacks like the LiteLLM compromise exfiltrate every env var, SSH key, and API key from compromised machines. AgentLair Vault prevents this architecturally — credentials are never in the environment.<p>I built AgentLair to give AI agents a real identity — not just an email address.<p>AgentMail raised $6M to solve the email problem. They've done great work, and email IS the starting point. But an agent's identity is more than email: it's the credentials it carries and the namespace it operates in.<p>What AgentLair is (all in one API):<p>1. Email — claim my-agent@agentlair.dev, send/receive, MCP-native. One curl call. No OAuth, no human in the loop.<p>2. Vault — encrypted credential storage. Your agent stores its own API keys at registration, fetches them at runtime. The server stores opaque blobs — you encrypt client-side with our SDK or your own scheme.<p>3. Pods — multi-tenant namespace isolation. Run multiple agents under one account; each pod only sees its own resources. Useful for SaaS products built on agents.<p>Self-registration in one call:<p><pre><code>  curl -X POST https://agentlair.dev/v1/auth/agent-register \
    -H "Content-Type: application/json" \
    -d '{"name": "my-research-agent"}'

  → { "api_key": "al_live_...", "email_address": "my-research-agent@agentlair.dev", "account_id": "..." }
</code></pre>
The agent gets an identity in a single call. No human in the loop anywhere.<p>MCP server (npm):<p><pre><code>  npx @agentlair/mcp@latest
</code></pre>
Works with Claude, Cursor, or any MCP-compatible client. 9 tools covering email and vault operations.<p>Why this now:<p>The MCP authentication story is broken. Perplexity's CTO left MCP over "authentication friction." VentureBeat: "When Agent A delegates to Agent B, no identity verification happens between them. A compromised agent inherits the trust of every agent it communicates with."<p>A Cloud Security Alliance study (March 25, 2026) found that more than two-thirds of organizations cannot clearly distinguish AI agent from human actions — and 33% don't know how often their agent credentials are rotated. (<a href="https://www.businesswire.com/news/home/20260324161665/en/" rel="nofollow">https://www.businesswire.com/news/home/20260324161665/en/</a>)<p>The protocol for tool access exists. The identity layer underneath it doesn't. AgentLair is that layer: persistent email address + credential vault + human-backed trust + micropayment hooks.<p>AgentMail is email-only. 1Password announced credential management for agents (enterprise-only). We bundle email + vault + isolation with a free tier. x402 micropayment support and World ID identity verification are next on the roadmap.<p>Where things are: Public beta. Pro plan is $5/stack/month for higher limits. Everything else is free tier. Free tier: 10 emails/day, 10 email addresses, 100 API requests/day.<p>Try it: <a href="https://agentlair.dev" rel="nofollow">https://agentlair.dev</a>
Docs: <a href="https://agentlair.dev/getting-started" rel="nofollow">https://agentlair.dev/getting-started</a>
MCP: npx @agentlair/mcp@latest<p>vs. AgentMail: They do email well. We do email + vault + pod isolation.
vs. 1Password: They do credentials for enterprises. We do $5/mo for indie devs.</p>
<hr>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=47573245">https://news.ycombinator.com/item?id=47573245</a></p>
<p>Points: 2</p>
<p># Comments: 2</p>
]]></description><pubDate>Mon, 30 Mar 2026 12:11:03 +0000</pubDate><link>https://agentlair.dev/</link><dc:creator>hawk_aa</dc:creator><comments>https://news.ycombinator.com/item?id=47573245</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47573245</guid></item></channel></rss>