<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Avinash Amudala</title>
    <description>The latest articles on DEV Community by Avinash Amudala (@avinash_amudala_8712ab560).</description>
    <link>https://dev.to/avinash_amudala_8712ab560</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3736257%2F4b9ef170-10fd-4f27-b4d9-9416beda226e.jpg</url>
      <title>DEV Community: Avinash Amudala</title>
      <link>https://dev.to/avinash_amudala_8712ab560</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/avinash_amudala_8712ab560"/>
    <language>en</language>
    <item>
      <title>Why Your AI Agent Has Root Access to Everything (And How to Fix It in 3 Lines of Python)</title>
      <dc:creator>Avinash Amudala</dc:creator>
      <pubDate>Thu, 16 Apr 2026 23:52:35 +0000</pubDate>
      <link>https://dev.to/avinash_amudala_8712ab560/why-your-ai-agent-has-root-access-to-everything-and-how-to-fix-it-in-3-lines-of-python-476d</link>
      <guid>https://dev.to/avinash_amudala_8712ab560/why-your-ai-agent-has-root-access-to-everything-and-how-to-fix-it-in-3-lines-of-python-476d</guid>
      <description>&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fdmaynm5l0rdbfdublfb1.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fdmaynm5l0rdbfdublfb1.png" alt=" " width="800" height="447"&gt;&lt;/a&gt;I’ve been building AI agents at work and kept running into the same problem: every framework lets agents call any registered tool with zero safety checks. An agent with database access can run &lt;code&gt;DROP TABLE users&lt;/code&gt; and nothing stops it.&lt;/p&gt;

&lt;p&gt;So I built &lt;strong&gt;AgentShield-FW&lt;/strong&gt;, a runtime firewall that intercepts every tool call and enforces configurable safety policies before execution.&lt;/p&gt;

&lt;p&gt;• GitHub: &lt;a href="https://github.com/Avinash-Amudala/AgentShield" rel="noopener noreferrer"&gt;https://github.com/Avinash-Amudala/AgentShield&lt;/a&gt;&lt;br&gt;
• PyPI: &lt;code&gt;pip install agentshield-fw&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The simplest usage:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;`import agentshield&lt;br&gt;
shield = agentshield.Shield()&lt;/p&gt;

&lt;p&gt;&lt;a class="mentioned-user" href="https://dev.to/shield"&gt;@shield&lt;/a&gt;.protect&lt;br&gt;
def execute_sql(query: str) -&amp;gt; str:&lt;br&gt;
    return db.execute(query)&lt;/p&gt;

&lt;p&gt;Agent tries: execute_sql("DROP TABLE users")&lt;br&gt;
→ Blocked by AgentShield: Destructive SQL detected (ASI02)`&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What makes it different:&lt;/strong&gt;&lt;br&gt;
• Zero required dependencies — core runs on Python stdlib only&lt;br&gt;
• 40+ pre-built rules covering SQL injection, path traversal, credential leaks, prompt injection, shell commands, rate limiting&lt;br&gt;
• Mapped to OWASP Agentic Security Top 10 (ASI01-ASI10)&lt;br&gt;
• Works with LangChain, MCP, CrewAI, OpenAI SDK, or any Python function&lt;br&gt;
• Sub-millisecond latency (&amp;lt;1ms p99)&lt;br&gt;
• 94.56% test coverage&lt;br&gt;
• Hash-chained audit logging for tamper detection&lt;/p&gt;

&lt;p&gt;Other projects called "AgentShield" are static scanners (analyze config files). This is a runtime firewall (intercepts live tool calls). WAF vs SAST.&lt;/p&gt;

&lt;p&gt;MIT license. Python 3.10-3.13.&lt;/p&gt;

</description>
      <category>ai</category>
      <category>python</category>
      <category>security</category>
      <category>opensource</category>
    </item>
  </channel>
</rss>
