23 pointsby devel1218 days ago8 comments
  • devel1218 days ago
    If you’re using MCP/tool-using coding agents internally, how are you handling “blast radius”? Are you relying on IAM scoping, confirmation prompts, sandboxing, policy proxies, or something else?
  • mayank_sethi18 days ago
    We kept hitting cases where read-only made agents useless, but write access was too risky. We ended up building a small stdio MCP proxy that lets us block dangerous operations at the argument level
  • mehulagrawal18 days ago
    Looks promising! Will try this out in my workflow.
  • kaushikasp18 days ago
    this seems super interesting - would totally give it a try this week.
  • 18 days ago
    undefined
  • avilasha18 days ago
    wohoo!
  • kxbnb16 days ago
    Great execution on this - the argument-level blocking is the key insight. The all-or-nothing permission model is exactly why MCP adoption stalls in production.

    We've been working on a similar problem at https://keypost.ai, coming at it from the policy enforcement angle - rate limits, cost caps, and access control rules that sit in-path. The challenge we keep hitting is rule composition: when you have multiple constraints (e.g., "can use github.delete but only on branches matching feature-*, and only 3x per hour"), the config can get unwieldy fast.

    Curious how you're handling rule definitions in Armour - is it purely argument pattern matching, or are you thinking about stateful rules (like rate limits or quotas)?

    Really glad to see more people building in this space. The MCP security story needs a lot more attention.

  • nirdiamant18 days ago
    [dead]