John--
You received this message because you are subscribed to the Google Groups "cap-talk" group.
To unsubscribe from this group and stop receiving emails from it, send an email to cap-talk+u...@googlegroups.com.
To view this discussion visit https://groups.google.com/d/msgid/cap-talk/CAGC3UEnp36%2BqyeYMewzmeeCZgkdz%2BqYaBeKHG85yY10qi3CExg%40mail.gmail.com.
To view this discussion visit https://groups.google.com/d/msgid/cap-talk/CAMpet1VxiDuDvWDmVD3VhxocPobhVjQVkvLaFfSsyFTxfAcBig%40mail.gmail.com.
I like the Mr. Meeseeks pattern. Bound authority for a task, tear it down when done.
I've been pushing on capability tokens as a way to bind authority to each tool invocation. The LLM can be as untrusted, as long-running, or as prompt-injected as you want. The authority for any specific action is bounded by the token presented for that action. And because tokens attenuate across delegation, each sub-agent ends up with a narrower Mr. Meeseeks of its own.
I think this addresses John P.'s "is it just illusory" concern by making sure no single invocation inherits the whole authority. Curious whether this matches what you had in mind, or whether you were pointing at something else.
A token narrow enough to authorize only "delete row 7" will still delete row 7 though.
POLA + HITL signature at the boundary for sensitive actions could be the answer here.
I've been formalizing this through this in AAT (draft-niyikiza-oauth-attenuating-agent-tokens, IETF OAuth WG). Working on version -01 to incorporate feedback we've been getting.
Niki
To view this discussion visit https://groups.google.com/d/msgid/cap-talk/CAGC3UEnDoPWfv_KKG1ZArB1tkEL8yaa9f2X8KiPapKt%3DxcPobA%40mail.gmail.com.
To view this discussion visit https://groups.google.com/d/msgid/cap-talk/CALGH9Z-3dKytX64mPg4sm6MNw4%2BzGTm5o29N%3Dj6deauj5CwBYw%40mail.gmail.com.