Menu
Blog How it works Use Cases
agentsh
Open-source runtime for AI agent security
Beacon
AI endpoint visibility and control
Watchtower
Enterprise control plane for agentsh and Beacon
Contact Us

Posts by Eran Sandler

11 posts

← All posts
5 min read

Untrusted Text, Trusted Shell

An attacker put untrusted text into a GitHub issue. An AI workflow turned it into shell commands inside CI. The Cline supply-chain incident shows why runtime enforcement matters more than prompt defense.

5 min read

Command Injection Is Not the Story. Inherited Authority Is.

The BeyondTrust Codex writeup shows a real command injection bug. But the deeper lesson is not about escaping shell arguments -- it is about why one injection was enough to steal a token and exfiltrate it.

10 min read

Supply Chain Attacks Are Hard to Stop Upstream. That Is Exactly Why You Need Control at Runtime

The LiteLLM compromise shows why upstream supply chain defenses are not enough. Once a bad package lands, what matters is whether it can actually do anything dangerous.

19 min read

A Year of AI Tool Exploits, One Root Cause

Fourteen vulnerabilities across Claude Code, Cursor, MCP servers, and Claude Desktop share a single root cause: untrusted content driving privileged actions with no independent enforcement layer.

4 min read

Rule Files Are Not Enforcement

Files like CLAUDE.md, GEMINI.md, and AGENTS.md are useful context, not real constraints. The difference between telling an agent 'please don't' and making it so it can't matters more than ever.

9 min read

The Worm That Came for MCP

GlassWorm started as a VS Code supply chain attack. Now it's targeting MCP packages directly. Here's exactly what it does, and why runtime enforcement is the layer that still works after a malicious package is already installed and running.

4 min read

One Line Under the Agent

Announcing @agentsh/secure-sandbox for TypeScript — one line to put AgentSH under the hosted sandbox your agent already uses, with kernel-level policy enforcement for file access, network egress, and process execution.

5 min read

Bugs Happen. Agents Still Run.

Agent runtimes are software, and software has bugs. When trust boundaries fail, the only durable defense is execution-layer security that constrains file access, network egress, and process execution.

11 min read

Breaking the Agentic Kill Chain: Where Beacon and AgentSH Disrupt Attacks

Mapping Beacon and AgentSH to the cybersecurity kill chain, showing where each product breaks the attacker's sequence in supervised and unsupervised AI environments.

6 min read

Intent, Execution, Audit: A Model for Agent Control

Most agent “guardrails” live before execution (prompts) or after execution (logs). This post explains why that leaves you with hope and hindsight, and why real control must exist at the execution layer.

6 min read

The Control Gap: Agents Move Faster Than Humans Can Supervise

What we are seeing as AI agents start taking real actions, and why human speed oversight cannot keep up with machine speed execution.