Risky Business Features

History Repeats: Security in the AI Agent Era

Feb 17, 2026
They dissect a fast-growing AI agent platform that mimics early internet trust mistakes. They expose how agents read/write files, store credentials in plaintext, and can commandeer browser sessions. They examine malicious skill registries, large-scale disclosure storms, and why banning agents fails. They urge organizations to rethink identity, isolation, and safe deployment before problems spiral.
Ask episode
AI Snips
Chapters
Transcript
Episode notes
INSIGHT

Agents Run Continuously As Background Services

  • OpenClaw runs as a persistent gateway daemon that keeps agents alive in the background.
  • That continuous loop enables scheduled tasks and long-running automation beyond interactive LLM sessions.
INSIGHT

Agent State Lives In Writable Markdown

  • OpenClaw blurs data and code by storing personality, memory, and schedule as writable markdown files.
  • The agent reads and rewrites these files, effectively evolving its own configuration over time.
ADVICE

Isolate Agents — Don’t Expose Gateways Publicly

  • Isolate agents heavily and avoid exposing gateway services directly to the public internet.
  • Use separate VMs, VLANs, and strict ACLs to limit agent access to sensitive resources.
Get the Snipd Podcast app to discover more snips from this episode
Get the app