<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Sam</title>
    <description>The latest articles on DEV Community by Sam (@highriseliving777).</description>
    <link>https://dev.to/highriseliving777</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3893757%2Fff6a63cb-ee25-43ba-82e6-bf95adca5f32.png</url>
      <title>DEV Community: Sam</title>
      <link>https://dev.to/highriseliving777</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/highriseliving777"/>
    <language>en</language>
    <item>
      <title>Sovereign AI – Why Your Agents Should Run on Your Hardware</title>
      <dc:creator>Sam</dc:creator>
      <pubDate>Thu, 23 Apr 2026 10:05:45 +0000</pubDate>
      <link>https://dev.to/highriseliving777/sovereign-ai-why-your-agents-should-run-on-your-hardware-486n</link>
      <guid>https://dev.to/highriseliving777/sovereign-ai-why-your-agents-should-run-on-your-hardware-486n</guid>
      <description>&lt;p&gt;Anthropic launched Claude Managed Agents. OpenAI has Operator. Microsoft offers Azure‑hosted governance. OpenBox AI raised $5M for cloud‑based "enterprise AI trust."&lt;/p&gt;

&lt;p&gt;Notice a pattern? &lt;strong&gt;They all run on someone else's hardware.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Your data. Your workflows. Your API keys. All processed on infrastructure you don't control.&lt;/p&gt;

&lt;p&gt;Here's why that's a problem—and why sovereign, self‑hosted governance is the only answer that scales.&lt;/p&gt;




&lt;h2&gt;
  
  
  🔴 The Vendor Lock‑In Trap
&lt;/h2&gt;

&lt;p&gt;Every major AI agent platform wants you in their ecosystem:&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Platform&lt;/th&gt;
&lt;th&gt;Self‑Hosted?&lt;/th&gt;
&lt;th&gt;Pricing Model&lt;/th&gt;
&lt;th&gt;Your Data&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Claude Managed Agents&lt;/td&gt;
&lt;td&gt;❌&lt;/td&gt;
&lt;td&gt;Per‑task + subscription&lt;/td&gt;
&lt;td&gt;On Anthropic servers&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;OpenAI Operator&lt;/td&gt;
&lt;td&gt;❌&lt;/td&gt;
&lt;td&gt;Usage‑based&lt;/td&gt;
&lt;td&gt;On OpenAI servers&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Microsoft AGT&lt;/td&gt;
&lt;td&gt;✅&lt;/td&gt;
&lt;td&gt;Azure subscription&lt;/td&gt;
&lt;td&gt;On Azure (you pay)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;OpenBox AI&lt;/td&gt;
&lt;td&gt;❌&lt;/td&gt;
&lt;td&gt;SaaS tiers&lt;/td&gt;
&lt;td&gt;On their cloud&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;ORBIT&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;✅&lt;/td&gt;
&lt;td&gt;Free (open‑source)&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;On your machine&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;The cloud platforms promise convenience. But they deliver &lt;strong&gt;dependency&lt;/strong&gt;.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Want to switch providers? Rewrite your integrations.&lt;/li&gt;
&lt;li&gt;Want to audit what happened? Hope their logs are complete.&lt;/li&gt;
&lt;li&gt;Want air‑gapped security? Not an option.&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  🔒 The Security Argument
&lt;/h2&gt;

&lt;p&gt;OWASP's MCP Top 10—released April 2026—highlights risks like &lt;strong&gt;insecure tool communication&lt;/strong&gt; (MCP‑06) and &lt;strong&gt;unverified tool sources&lt;/strong&gt; (MCP‑10). When everything runs locally, those risks collapse:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;MCP messages never leave your machine → no MITM attack surface&lt;/li&gt;
&lt;li&gt;Tool registrations are local → no remote injection vector&lt;/li&gt;
&lt;li&gt;API keys stay in your environment → no cloud credential leakage&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The nginx‑ui CVE‑2026‑33032 exploits MCP as a systemic blind spot in cloud deployments. Local‑first architecture eliminates that blind spot entirely.&lt;/p&gt;




&lt;h2&gt;
  
  
  🏗️ The ORBIT Architecture
&lt;/h2&gt;

&lt;p&gt;ORBIT runs entirely on your hardware. We tested it on a &lt;strong&gt;2016 MacBook Pro&lt;/strong&gt;:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Sandbox:&lt;/strong&gt; macOS sandbox‑exec (native, no Docker required)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Policy:&lt;/strong&gt; OPA/Rego (open‑standard, forward‑compatible with Microsoft AGT)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Memory:&lt;/strong&gt; TF‑IDF local vector storage (no cloud embeddings)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Model:&lt;/strong&gt; GLM‑5.1 integration ready (MIT‑licensed, runs locally via Ollama)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Your agents. Your data. Your rules. &lt;strong&gt;Your hardware.&lt;/strong&gt;&lt;/p&gt;




&lt;h2&gt;
  
  
  🧠 Local‑First Memory Without Vendor Lock‑In
&lt;/h2&gt;

&lt;p&gt;Most agent platforms use cloud‑based vector databases with proprietary embedding models. Your agent's "memory" becomes a subscription.&lt;/p&gt;

&lt;p&gt;ORBIT uses TF‑IDF—a lightweight, CPU‑friendly semantic memory that runs locally and stores everything in human‑readable JSONL files. It's not just a feature. It's a philosophy.&lt;/p&gt;

&lt;p&gt;Research from the &lt;strong&gt;Engram persistent memory architecture (arXiv:2603.21321)&lt;/strong&gt; validates this approach: hierarchical, local‑first memory for long‑term agent recall without external dependencies.&lt;/p&gt;




&lt;h2&gt;
  
  
  📊 The Market is Validating Sovereignty
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;GitGuardian raised $50M&lt;/strong&gt; for "non‑human identity" security—agent secrets management is a top concern&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Sycamore Labs raised $65M&lt;/strong&gt; for Geordie AI—enterprise AI OS, but cloud‑dependent&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Capsule Security raised $7M&lt;/strong&gt; for runtime agent trust—overlapping vision, cloud‑first&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The demand is real. ORBIT is the only platform that delivers it &lt;strong&gt;without a cloud subscription&lt;/strong&gt;.&lt;/p&gt;




&lt;h2&gt;
  
  
  🚀 Get Started
&lt;/h2&gt;

&lt;p&gt;ORBIT is open‑source, MIT‑licensed, and runs on commodity hardware.&lt;/p&gt;

&lt;p&gt;👉 &lt;strong&gt;GitHub:&lt;/strong&gt; &lt;a href="https://github.com/highriseliving777/orbit" rel="noopener noreferrer"&gt;highriseliving777/orbit&lt;/a&gt;&lt;br&gt;
🎥 &lt;strong&gt;Demo (90 sec):&lt;/strong&gt; &lt;a href="https://youtu.be/U0K8PBMUEnc" rel="noopener noreferrer"&gt;Watch on YouTube&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Your agents should run on your hardware. Govern them yourself.&lt;/p&gt;




&lt;p&gt;&lt;em&gt;Read the full ORBIT series: &lt;a href="https://dev.to/highriseliving777/how-orbit-solves-the-langflow-cve-2026-33017-vulnerability-2fgn"&gt;Langflow CVE&lt;/a&gt; · &lt;a href="https://dev.to/highriseliving777/stateful-budgets-why-microsoft-agt-issue-42-still-matters-4e9h"&gt;Stateful Budgets vs Microsoft AGT&lt;/a&gt; · &lt;a href="https://dev.to/highriseliving777/the-lovable-data-exposure-a-case-study-in-agent-governance-4f9e"&gt;Lovable Case Study&lt;/a&gt; · &lt;a href="https://dev.to/highriseliving777/owasp-mcp-top-10-compliance-how-orbit-addresses-every-risk-h94"&gt;OWASP MCP Compliance&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;

</description>
      <category>ai</category>
      <category>security</category>
      <category>opensource</category>
      <category>privacy</category>
    </item>
    <item>
      <title>OWASP MCP Top 10 Compliance – How ORBIT Addresses Every Risk</title>
      <dc:creator>Sam</dc:creator>
      <pubDate>Thu, 23 Apr 2026 10:01:03 +0000</pubDate>
      <link>https://dev.to/highriseliving777/owasp-mcp-top-10-compliance-how-orbit-addresses-every-risk-h94</link>
      <guid>https://dev.to/highriseliving777/owasp-mcp-top-10-compliance-how-orbit-addresses-every-risk-h94</guid>
      <description>&lt;p&gt;The OWASP Foundation released the &lt;strong&gt;MCP Top 10&lt;/strong&gt; in April 2026. It's the definitive risk framework for Model Context Protocol—the protocol connecting AI agents to tools.&lt;/p&gt;

&lt;p&gt;Schema poisoning. Tool output tampering. Sensitive data leakage. These aren't theoretical. Langflow CVE‑2026‑33017 proved that MCP attacks are active and fast.&lt;/p&gt;

&lt;p&gt;ORBIT was built with these threats in mind. Below is a complete mapping of every OWASP MCP risk to ORBIT's mitigation.&lt;/p&gt;




&lt;h2&gt;
  
  
  📊 OWASP MCP Top 10 – ORBIT Compliance Matrix
&lt;/h2&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Risk&lt;/th&gt;
&lt;th&gt;Description&lt;/th&gt;
&lt;th&gt;ORBIT Mitigation&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;MCP‑01: Schema Poisoning&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Malicious tool definitions trick agents&lt;/td&gt;
&lt;td&gt;Strict JSON Schema validation in &lt;code&gt;mcp_gateway.py&lt;/code&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;MCP‑02: Tool Output Tampering&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Modified tool responses inject commands&lt;/td&gt;
&lt;td&gt;SHA‑256 hashing of all outputs in audit log&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;MCP‑03: Prompt Injection via Tools&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Tool descriptions carry malicious prompts&lt;/td&gt;
&lt;td&gt;Description sanitization + length limits&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;MCP‑04: Excessive Tool Exposure&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Agents see more tools than needed&lt;/td&gt;
&lt;td&gt;Capability Governor hides disallowed tools&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;MCP‑05: Sensitive Data Leakage&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Tools return secrets (API keys, tokens)&lt;/td&gt;
&lt;td&gt;Real‑time secret detection &amp;amp; redaction&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;MCP‑06: Insecure Communication&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Unencrypted MCP messages&lt;/td&gt;
&lt;td&gt;Local‑first design (all internal); TLS for remote&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;MCP‑07: Rate Limiting Bypass&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;DoS via flooding&lt;/td&gt;
&lt;td&gt;Per‑tool rate limiter (1 req/sec)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;MCP‑08: Insecure Deserialization&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Malicious JSON payloads&lt;/td&gt;
&lt;td&gt;Safe &lt;code&gt;json&lt;/code&gt; parsing only, no pickle&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;MCP‑09: Excessive Output Size&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Memory exhaustion via huge responses&lt;/td&gt;
&lt;td&gt;Configurable &lt;code&gt;max_output_size&lt;/code&gt; per tool (default 10 MB)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;MCP‑10: Unverified Tool Sources&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Untrusted tools execute without checks&lt;/td&gt;
&lt;td&gt;OPA/Rego explicit allow lists per agent&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;




&lt;h2&gt;
  
  
  🔍 Three Highlights
&lt;/h2&gt;

&lt;h3&gt;
  
  
  1. Schema Validation (MCP‑01)
&lt;/h3&gt;

&lt;p&gt;Before any tool runs, ORBIT validates its definition against a strict JSON schema. The Langflow exploit relied on a missing &lt;code&gt;input_schema&lt;/code&gt; field—ORBIT rejects that instantly.&lt;/p&gt;

&lt;h3&gt;
  
  
  2. Secret Redaction (MCP‑05)
&lt;/h3&gt;

&lt;p&gt;The Lovable incident exposed API keys because no one sanitized outputs. ORBIT's &lt;code&gt;detect_secrets.py&lt;/code&gt; scans for 9 distinct secret patterns and redacts them before the agent sees the output.&lt;/p&gt;

&lt;h3&gt;
  
  
  3. Stateful Budgets (Beyond OWASP)
&lt;/h3&gt;

&lt;p&gt;OWASP doesn't cover budget exhaustion—but it's a critical risk. ORBIT's cumulative 24h/7d/30d budget enforcement stops runaway agents from draining credits, which is a gap Microsoft AGT still leaves open (Issue #42).&lt;/p&gt;




&lt;h2&gt;
  
  
  🚀 Get Started
&lt;/h2&gt;

&lt;p&gt;ORBIT is open‑source, self‑hosted, and OWASP‑compliant out of the box.&lt;/p&gt;

&lt;p&gt;👉 &lt;strong&gt;GitHub:&lt;/strong&gt; &lt;a href="https://github.com/highriseliving777/orbit" rel="noopener noreferrer"&gt;highriseliving777/orbit&lt;/a&gt;&lt;br&gt;
🎥 &lt;strong&gt;Demo (90 sec):&lt;/strong&gt; &lt;a href="https://youtu.be/U0K8PBMUEnc" rel="noopener noreferrer"&gt;Watch on YouTube&lt;/a&gt;&lt;br&gt;
📄 &lt;strong&gt;Full compliance matrix:&lt;/strong&gt; &lt;a href="https://github.com/highriseliving777/orbit/blob/main/OWASP_MCP_COMPLIANCE.md" rel="noopener noreferrer"&gt;OWASP_MCP_COMPLIANCE.md&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Govern your agents before they govern you.&lt;/p&gt;




&lt;p&gt;&lt;em&gt;Previously: &lt;a href="https://dev.to/highriseliving777/how-orbit-solves-the-langflow-cve-2026-33017-vulnerability-2fgn"&gt;How ORBIT Solves the Langflow CVE&lt;/a&gt; · &lt;a href="https://dev.to/highriseliving777/stateful-budgets-why-microsoft-agt-issue-42-still-matters-4e9h"&gt;Stateful Budgets vs Microsoft AGT&lt;/a&gt; · &lt;a href="https://dev.to/highriseliving777/the-lovable-data-exposure-a-case-study-in-agent-governance-4f9e"&gt;Lovable Data Exposure Case Study&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;

</description>
      <category>ai</category>
      <category>opensource</category>
      <category>security</category>
      <category>mcp</category>
    </item>
    <item>
      <title>The Lovable Data Exposure – A Case Study in Agent Governance</title>
      <dc:creator>Sam</dc:creator>
      <pubDate>Thu, 23 Apr 2026 09:53:19 +0000</pubDate>
      <link>https://dev.to/highriseliving777/the-lovable-data-exposure-a-case-study-in-agent-governance-4f9e</link>
      <guid>https://dev.to/highriseliving777/the-lovable-data-exposure-a-case-study-in-agent-governance-4f9e</guid>
      <description>&lt;p&gt;In early 2026, a popular AI‑powered app builder called Lovable inadvertently exposed internal system prompts and API keys. The cause? An AI agent with unrestricted file access.&lt;/p&gt;

&lt;p&gt;No hack. No breach. Just an agent that was allowed to read &lt;code&gt;.env&lt;/code&gt; files and return their contents to the user interface.&lt;/p&gt;

&lt;p&gt;Here's how it happened—and how ORBIT would have stopped it at &lt;strong&gt;three separate layers&lt;/strong&gt;.&lt;/p&gt;




&lt;h2&gt;
  
  
  🔴 What Went Wrong
&lt;/h2&gt;

&lt;p&gt;Lovable's agent could read arbitrary files as part of its workflow. When it accidentally accessed sensitive files, the contents were displayed directly in the UI.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The three failures:&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Over‑privileged agent&lt;/strong&gt; – no file‑level deny patterns&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;No output sanitization&lt;/strong&gt; – secrets passed through unredacted&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;No audit trail&lt;/strong&gt; – the team scrambled to understand the scope&lt;/li&gt;
&lt;/ol&gt;




&lt;h2&gt;
  
  
  🛡️ Layer 1: MCP Gateway Policy (Pre‑Execution)
&lt;/h2&gt;

&lt;p&gt;ORBIT's &lt;code&gt;mcp_gateway.py&lt;/code&gt; enforces deny patterns. Before an agent opens a file, the policy engine checks it against a blocklist:&lt;/p&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;
yaml
deny:
  patterns:
    - '.*\\.env'
    - '.*\\.key'
    - '.*\\.pem'
Result: The agent would have been blocked from reading .env entirely. The sensitive file would never have been opened.

🛡️ Layer 2: Secret Detection &amp;amp; Redaction (Runtime)
Even if the agent somehow accessed the file, ORBIT's detect_secrets.py scans all tool outputs for high‑confidence secret patterns and redacts them in real‑time:

text
Original: "OPENAI_API_KEY=sk-1234567890abcdef"
Redacted: "OPENAI_API_KEY=[REDACTED_OPENAI_API_KEY]"
The user sees a safe, redacted message. No keys exposed.

🛡️ Layer 3: Tamper‑Proof Audit Trail (Post‑Execution)
Every tool invocation is logged in dot_orbit/audit.jsonl with a SHA‑256 hash, timestamp, and agent ID:

bash
cat dot_orbit/audit.jsonl | jq 'select(.tool_name == "read_file" and .arguments | contains(".env"))'
The security team would know instantly which agent accessed which file and when. No scrambling. No guesswork.

📊 Why This Matters
The Lovable incident wasn't a sophisticated attack. It was a predictable failure of ungoverned agents. As agentic workflows become mainstream, these incidents will multiply.

The OWASP MCP Top 10—released April 2026—confirms this. Schema poisoning, tool output tampering, and sensitive data leakage top the list.

🚀 Get Started
ORBIT is open‑source, self‑hosted, and ready to prevent your "Lovable moment."

👉 GitHub: highriseliving777/orbit
🎥 Demo (90 sec): Watch on YouTube

Govern your agents before they govern you.

Previously: How ORBIT Solves the Langflow CVE‑2026‑33017 Vulnerability · Stateful Budgets – Why Microsoft AGT Issue #42 Still Matters
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;

</description>
      <category>ai</category>
      <category>opensource</category>
      <category>security</category>
      <category>mcp</category>
    </item>
    <item>
      <title>Stateful Budgets – Why Microsoft AGT Issue #42 Still Matters</title>
      <dc:creator>Sam</dc:creator>
      <pubDate>Thu, 23 Apr 2026 09:32:57 +0000</pubDate>
      <link>https://dev.to/highriseliving777/stateful-budgets-why-microsoft-agt-issue-42-still-matters-4e9h</link>
      <guid>https://dev.to/highriseliving777/stateful-budgets-why-microsoft-agt-issue-42-still-matters-4e9h</guid>
      <description>&lt;p&gt;In the race to govern AI agents, Microsoft's Agent Governance Toolkit (AGT) has become a popular choice. It integrates with Azure, supports OPA/Rego policies, and offers a 4‑tier sandbox ring.&lt;/p&gt;

&lt;p&gt;But there's a critical gap. And it's been sitting in their GitHub issues for over a year.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Issue #42: Stateful budget policies.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Without stateful budgets, your agents can spend unlimited resources over time. Here's why that matters—and how ORBIT solves it.&lt;/p&gt;




&lt;h2&gt;
  
  
  🔴 The Problem: Stateless Budgets Are a Leaky Sieve
&lt;/h2&gt;

&lt;p&gt;Microsoft AGT enforces &lt;strong&gt;per‑task&lt;/strong&gt; budgets. Each tool invocation is checked against a fixed limit. If the task costs $0.50 and the limit is $1.00, it passes.&lt;/p&gt;

&lt;p&gt;But what happens when an agent runs 100 tasks in a day? Or 10,000?&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Nothing.&lt;/strong&gt; There is no cumulative tracking. A malicious or runaway agent can exhaust your API credits, compute resources, or cloud budget in hours.&lt;/p&gt;

&lt;p&gt;This is not theoretical. Langflow CVE‑2026‑33017 showed how fast ungoverned agents can cause damage. Budget exhaustion is the next frontier.&lt;/p&gt;




&lt;h2&gt;
  
  
  🛡️ How ORBIT Enforces Stateful Budgets
&lt;/h2&gt;

&lt;p&gt;ORBIT tracks cumulative spend across &lt;strong&gt;three time windows&lt;/strong&gt;:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;24 hours&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;7 days&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;30 days&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Every tool invocation is logged to &lt;code&gt;budget_history.jsonl&lt;/code&gt; with a timestamp, agent ID, and cost. The policy engine (OPA/Rego) checks cumulative limits &lt;em&gt;before&lt;/em&gt; allowing execution.&lt;/p&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;
python
# ORBIT budget check (simplified)
spent_24h = get_spend_last_24h(agent_id)
if spent_24h + cost &amp;gt; max_24h:
    return False  # ❌ Blocked
Demo: In our 90‑second walkthrough, we pre‑load $1.50 of usage, then run an echo command that costs $0.50. The first call passes (total $2.00 = limit). The second call is blocked with:

BLOCKED: 24h budget exceeded: spent $2.00, limit $2.00
📊 The Competitive Landscape
Feature ORBIT   Microsoft AGT   Claude Managed
Per‑task budget   ✅ ✅ ❌
24h cumulative budget   ✅ ❌ ❌
7d / 30d cumulative budget  ✅ ❌ ❌
Self‑hosted   ✅ ✅ ❌
Microsoft's own issue thread acknowledges the gap. As of April 2026, Issue #42 remains open with no ETA.

🤔 Why Microsoft Hasn't Fixed This (Speculation)
Stateful budgets require persistent state—a database that tracks every transaction across agent sessions. This conflicts with AGT's "stateless by design" philosophy. Adding state introduces complexity they've been unwilling to tackle.

ORBIT was built from day one with stateful enforcement. Our budget engine is a core pillar, not an afterthought.

🚀 Get Started
ORBIT is open‑source and runs entirely on your hardware. No Azure subscription required.

👉 GitHub: highriseliving777/orbit
🎥 Demo (90 sec): Watch on YouTube

Don't let your agents spend you into the ground. Govern them with ORBIT.

Previously: How ORBIT Solves the Langflow CVE‑2026‑33017 Vulnerability. Next up: "The Lovable Data Exposure – A Case Study in Agent Governance."
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;

</description>
      <category>ai</category>
      <category>opensource</category>
      <category>security</category>
      <category>mcp</category>
    </item>
    <item>
      <title>How ORBIT Solves the Langflow CVE‑2026‑33017 Vulnerability</title>
      <dc:creator>Sam</dc:creator>
      <pubDate>Thu, 23 Apr 2026 08:26:14 +0000</pubDate>
      <link>https://dev.to/highriseliving777/how-orbit-solves-the-langflow-cve-2026-33017-vulnerability-2fgn</link>
      <guid>https://dev.to/highriseliving777/how-orbit-solves-the-langflow-cve-2026-33017-vulnerability-2fgn</guid>
      <description>&lt;p&gt;In March 2026, a critical flaw in Langflow (CVE‑2026‑33017) was exploited in the wild within &lt;strong&gt;20 hours&lt;/strong&gt; of disclosure. Attackers hijacked agent workflows, injected malicious code, and exfiltrated sensitive data. The root cause? &lt;strong&gt;Ungoverned MCP tool execution.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;This isn't an isolated incident. The OWASP Foundation just released the &lt;strong&gt;MCP Top 10&lt;/strong&gt;—and &lt;strong&gt;schema poisoning&lt;/strong&gt; (MCP‑01) and &lt;strong&gt;tool output tampering&lt;/strong&gt; (MCP‑02) top the list.&lt;/p&gt;

&lt;p&gt;Here's how &lt;strong&gt;ORBIT&lt;/strong&gt;—a sovereign, self‑hosted governance platform—would have blocked the Langflow attack at three layers.&lt;/p&gt;




&lt;h2&gt;
  
  
  🔴 What Happened with Langflow
&lt;/h2&gt;

&lt;p&gt;Langflow allows users to build AI workflows by connecting "components" (tools) via a drag‑and‑drop interface. The vulnerability allowed an attacker to &lt;strong&gt;inject a malicious component definition&lt;/strong&gt; that executed arbitrary code on the server.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The failure chain:&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;No validation of component schemas&lt;/li&gt;
&lt;li&gt;No sanitization of tool outputs&lt;/li&gt;
&lt;li&gt;No audit trail to trace the breach&lt;/li&gt;
&lt;/ol&gt;




&lt;h2&gt;
  
  
  🛡️ How ORBIT's MCP Gateway Would Have Prevented It
&lt;/h2&gt;

&lt;h3&gt;
  
  
  1. Strict Schema Validation (OWASP MCP‑01)
&lt;/h3&gt;

&lt;p&gt;ORBIT's &lt;code&gt;mcp_gateway.py&lt;/code&gt; enforces a JSON schema on every registered tool. Malformed or malicious definitions are rejected &lt;em&gt;before&lt;/em&gt; they ever reach the agent.&lt;/p&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;
python
# ORBIT rejects this immediately
malicious_tool = {"name": "evil", "description": "..."}  # missing required 'input_schema'
validate_tool_definition(malicious_tool)  # ❌ ValueError
2. Secret Detection &amp;amp; Redaction (OWASP MCP‑05)
Even if a tool somehow executed, ORBIT scans all outputs for high‑confidence secret patterns (OpenAI keys, AWS tokens, etc.) and redacts them in real‑time.

python
output = "API_KEY=sk-1234567890abcdef"
sanitized = sanitize_tool_output(output, "some_tool")
print(sanitized["data"])  # "API_KEY=[REDACTED_OPENAI_API_KEY]"
3. Tamper‑Proof Audit Trail
Every tool invocation is logged with a SHA‑256 hash, timestamp, and agent ID in audit.jsonl. Security teams can instantly query:

bash
cat dot_orbit/audit.jsonl | jq 'select(.event == "mcp_tool_invoked")'
📊 ORBIT vs. The Alternatives
Feature ORBIT   Microsoft AGT   Langflow (Patched)
MCP schema validation   ✅ ✅ ✅ (post‑CVE)
Output secret redaction ✅ ❌ ❌
Stateful budget controls    ✅ ❌ ❌
Self‑hosted / sovereign   ✅ ✅ ✅
🚀 Get Started
ORBIT is open‑source and runs entirely on your hardware.

👉 GitHub: highriseliving777/orbit
🎥 Demo (90 sec): Watch on YouTube
  &lt;iframe src="https://www.youtube.com/embed/U0K8PBMUEnc"&gt;
  &lt;/iframe&gt;

If you're building AI agents, don't wait for the next CVE. Govern them now.

Follow for more agentic security deep dives. Next up: "Stateful Budgets – Why Microsoft AGT Issue #42 Still Matters."
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;

</description>
      <category>ai</category>
      <category>opensource</category>
      <category>security</category>
      <category>mcp</category>
    </item>
  </channel>
</rss>
