Skip to content

Instantly share code, notes, and snippets.

View kcosr's full-sized avatar

Kevin kcosr

View GitHub Profile
@kcosr
kcosr / orchestration-workflow.md
Created December 9, 2025 03:50
Multi-Agent Orchestration Workflow

Multi-Agent Orchestration Workflow

This document describes the workflow for an orchestrator agent to break down a large task into sub-tasks, delegate to worker agents, and coordinate the work to completion.

Overview

┌─────────────────────────────────────────────────────────────────┐
│                     Orchestrator Agent                          │
│                                                                 │
@kcosr
kcosr / securing-network-access-from-containers-with-transparent-proxy.md
Last active December 7, 2025 09:52
Securing Network Access from Containers with a Transparent Proxy

Securing Network Access from Containers with a Transparent Proxy

This pattern uses iptables to redirect outbound HTTP/HTTPS traffic through a transparent MITM proxy such as kcosr/acl-proxy (WIP prototype), allowing you to filter requests by URL, inspect content, log traffic, enforce allow/deny lists, or even inject credentials you don't want to deploy in the container.

Note: This approach can be used without containers if you trust that all commands invoked by the agent CLI will respect HTTP_PROXY environment variables.

How It Works

  1. Container starts with temporary sudo access to iptables
  2. Entrypoint script configures iptables to redirect traffic to the proxy
@kcosr
kcosr / securing-file-based-credentials-in-containers.md
Last active December 5, 2025 14:36
Securing File-Based Credentials in Containers

Securing File-Based Credentials in Containers

This pattern allows a non-root container user to run utilities that use file-based credentials (e.g., gh, git) while limiting direct access to those credentials files. Credentials are mounted into root's home read by utilities run using sudo.

If a priviledged utility can be instructed to read arbitrary files or dump credentials, no security is provided beyond obfuscation. This pattern can be useful to prevent accidental reads or low-complexity exploits but will not block access. A proxy-based approach, combined with credentials injection in the request, is better.

Example Exploits

gh auth token