<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: VenkateshwarRao Nagala</title>
    <description>The latest articles on DEV Community by VenkateshwarRao Nagala (@venkat_nagala).</description>
    <link>https://dev.to/venkat_nagala</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3854258%2F1e610ba6-1207-41c8-acb7-7dba0db94659.png</url>
      <title>DEV Community: VenkateshwarRao Nagala</title>
      <link>https://dev.to/venkat_nagala</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/venkat_nagala"/>
    <language>en</language>
    <item>
      <title>AgentX-Phase2: Zero-Trust Security for MCP Servers — Rust Middleware + JWT + Istio AuthorizationPolicy</title>
      <dc:creator>VenkateshwarRao Nagala</dc:creator>
      <pubDate>Tue, 31 Mar 2026 21:56:11 +0000</pubDate>
      <link>https://dev.to/venkat_nagala/agentx-phase2-zero-trust-security-for-mcp-servers-rust-middleware-jwt-istio-3en1</link>
      <guid>https://dev.to/venkat_nagala/agentx-phase2-zero-trust-security-for-mcp-servers-rust-middleware-jwt-istio-3en1</guid>
      <description>&lt;h1&gt;
  
  
  AgentX-Phase2: Zero-Trust Security for MCP Servers
&lt;/h1&gt;

&lt;h2&gt;
  
  
  Rust Middleware + JWT RBAC + Istio AuthorizationPolicy
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Author:&lt;/strong&gt; Venkateshwar Rao Nagala | Founder &amp;amp; CEO&lt;br&gt;&lt;br&gt;
&lt;strong&gt;Company:&lt;/strong&gt; For the Cloud By the Cloud | Hyderabad, India&lt;br&gt;&lt;br&gt;
&lt;strong&gt;Submission:&lt;/strong&gt; Solo.io MCP_HACK//26 — Secure &amp;amp; Govern MCP&lt;br&gt;&lt;br&gt;
&lt;strong&gt;GitHub:&lt;/strong&gt; &lt;a href="https://github.com/tenalirama2005/AgentX-Phase2" rel="noopener noreferrer"&gt;https://github.com/tenalirama2005/AgentX-Phase2&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;strong&gt;Demo Video:&lt;/strong&gt; &lt;a href="https://youtu.be/F7xWzoQ3e3M" rel="noopener noreferrer"&gt;https://youtu.be/F7xWzoQ3e3M&lt;/a&gt;&lt;br&gt;
&lt;strong&gt;Full Demo (4:44):&lt;/strong&gt; &lt;a href="https://youtu.be/k4Xzbp-M2fc" rel="noopener noreferrer"&gt;https://youtu.be/k4Xzbp-M2fc&lt;/a&gt;  &lt;/p&gt;


&lt;h2&gt;
  
  
  The Security Problem in Multi-Agent Systems
&lt;/h2&gt;

&lt;p&gt;When AI agents communicate with MCP servers, the default &lt;br&gt;
assumption is trust. Agents call tools, tools return data, &lt;br&gt;
and nothing enforces whether that agent should have access &lt;br&gt;
in the first place. Prompt-based guardrails are not enough &lt;br&gt;
— they can be bypassed by prompt injection, jailbreaking, &lt;br&gt;
or simply a misconfigured agent.&lt;/p&gt;

&lt;p&gt;AgentX-Phase2 solves this with three independent &lt;br&gt;
programmatic security layers enforced at the code, &lt;br&gt;
gateway, and network layers respectively. No single &lt;br&gt;
layer failure can compromise the system.&lt;/p&gt;


&lt;h2&gt;
  
  
  What is AgentX-Phase2?
&lt;/h2&gt;

&lt;p&gt;AgentX-Phase2 is a production-grade Kubernetes &lt;br&gt;
multi-agent pipeline that automatically modernizes &lt;br&gt;
legacy COBOL programs to memory-safe Rust using 49 &lt;br&gt;
AI models with Byzantine fault-tolerant FBA consensus.&lt;/p&gt;

&lt;p&gt;The pipeline:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;COBOL Source (AWS S3: interest_calc.cbl + loan_data.json)
  → AgentGateway (JWT + RBAC)
    → 4 MCP Servers (s3_mcp, cobol_mcp, rust_mcp, ai_mcp)
      → 49 AI Models (FBA Consensus)
        → Validated Memory-Safe Rust Output
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;The founder personally wrote and maintained &lt;br&gt;
HomeComm/LifeComm — P&amp;amp;C and Life Insurance Policy &lt;br&gt;
Administration (80% HLASM Assembler, 20% COBOL) at &lt;br&gt;
major US insurance carriers, and core banking DDA &lt;br&gt;
systems at a major North American bank. AgentX-Phase2 &lt;br&gt;
is built from the inside out.&lt;/p&gt;


&lt;h2&gt;
  
  
  The Three Security Layers
&lt;/h2&gt;
&lt;h3&gt;
  
  
  Layer 1 — Rust GatewayAuth Middleware
&lt;/h3&gt;

&lt;p&gt;The first line of defense is a custom Rust middleware &lt;br&gt;
component called GatewayAuth. Every request to any &lt;br&gt;
MCP server must carry a valid X-AgentGateway-Token &lt;br&gt;
header. Without it — immediate 401 rejection at &lt;br&gt;
the code layer.&lt;/p&gt;

&lt;p&gt;This is not a prompt instruction. It is not a &lt;br&gt;
guideline. It is compiled Rust code running as &lt;br&gt;
a middleware gate. No agent prompt can override it.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight rust"&gt;&lt;code&gt;&lt;span class="c1"&gt;// GatewayAuth middleware — simplified&lt;/span&gt;
&lt;span class="k"&gt;async&lt;/span&gt; &lt;span class="k"&gt;fn&lt;/span&gt; &lt;span class="nf"&gt;auth_middleware&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;req&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt; &lt;span class="n"&gt;Request&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt; &lt;span class="k"&gt;-&amp;gt;&lt;/span&gt; &lt;span class="nb"&gt;Result&lt;/span&gt;&lt;span class="o"&gt;&amp;lt;&lt;/span&gt;&lt;span class="n"&gt;Response&lt;/span&gt;&lt;span class="o"&gt;&amp;gt;&lt;/span&gt; &lt;span class="p"&gt;{&lt;/span&gt;
    &lt;span class="k"&gt;let&lt;/span&gt; &lt;span class="n"&gt;token&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;req&lt;/span&gt;&lt;span class="nf"&gt;.headers&lt;/span&gt;&lt;span class="p"&gt;()&lt;/span&gt;
        &lt;span class="nf"&gt;.get&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="s"&gt;"X-AgentGateway-Token"&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;
        &lt;span class="nf"&gt;.ok_or&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="nn"&gt;Error&lt;/span&gt;&lt;span class="p"&gt;::&lt;/span&gt;&lt;span class="n"&gt;Unauthorized&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;&lt;span class="o"&gt;?&lt;/span&gt;&lt;span class="p"&gt;;&lt;/span&gt;

    &lt;span class="nf"&gt;validate_token&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;token&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;&lt;span class="o"&gt;?&lt;/span&gt;&lt;span class="p"&gt;;&lt;/span&gt;
    &lt;span class="nf"&gt;Ok&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="nf"&gt;next&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;req&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;&lt;span class="k"&gt;.await&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;
&lt;span class="p"&gt;}&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;strong&gt;Why Rust?&lt;/strong&gt; The same reason Solo.io built AgentGateway &lt;br&gt;
in Rust — performance, memory safety, and zero runtime &lt;br&gt;
overhead. Security enforcement should never be the &lt;br&gt;
bottleneck.&lt;/p&gt;
&lt;h3&gt;
  
  
  Layer 2 — JWT + Role-Based Access Control
&lt;/h3&gt;

&lt;p&gt;AgentGateway enforces role-based routing between agents &lt;br&gt;
and MCP servers:&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Agent&lt;/th&gt;
&lt;th&gt;Role&lt;/th&gt;
&lt;th&gt;Access&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Green agent (orchestrator)&lt;/td&gt;
&lt;td&gt;orchestrator&lt;/td&gt;
&lt;td&gt;All 4 MCP servers&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Purple agent (FBA coordinator)&lt;/td&gt;
&lt;td&gt;modernizer&lt;/td&gt;
&lt;td&gt;Restricted&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;JWT tokens are issued per agent with embedded role &lt;br&gt;
claims. The gateway validates the token, extracts the &lt;br&gt;
role, and routes — or rejects — accordingly. Wrong &lt;br&gt;
role for the requested resource = immediate block, &lt;br&gt;
regardless of what the agent prompt says.&lt;/p&gt;
&lt;h3&gt;
  
  
  Layer 3 — Istio AuthorizationPolicy
&lt;/h3&gt;

&lt;p&gt;The third layer operates at the network layer via &lt;br&gt;
Istio service mesh. Even if the application layer &lt;br&gt;
is compromised, unauthorized inter-service traffic &lt;br&gt;
is blocked at the network level.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight yaml"&gt;&lt;code&gt;&lt;span class="na"&gt;apiVersion&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="s"&gt;security.istio.io/v1beta1&lt;/span&gt;
&lt;span class="na"&gt;kind&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="s"&gt;AuthorizationPolicy&lt;/span&gt;
&lt;span class="na"&gt;metadata&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt;
  &lt;span class="na"&gt;name&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="s"&gt;agentx-zero-trust&lt;/span&gt;
  &lt;span class="na"&gt;namespace&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="s"&gt;mainframe-modernization&lt;/span&gt;
&lt;span class="na"&gt;spec&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt;
  &lt;span class="na"&gt;rules&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt;
  &lt;span class="pi"&gt;-&lt;/span&gt; &lt;span class="na"&gt;from&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt;
    &lt;span class="pi"&gt;-&lt;/span&gt; &lt;span class="na"&gt;source&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt;
        &lt;span class="na"&gt;principals&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="pi"&gt;[&lt;/span&gt;&lt;span class="s2"&gt;"&lt;/span&gt;&lt;span class="s"&gt;cluster.local/ns/mainframe-modernization/sa/green-agent"&lt;/span&gt;&lt;span class="pi"&gt;]&lt;/span&gt;
    &lt;span class="na"&gt;to&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt;
    &lt;span class="pi"&gt;-&lt;/span&gt; &lt;span class="na"&gt;operation&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt;
        &lt;span class="na"&gt;methods&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="pi"&gt;[&lt;/span&gt;&lt;span class="s2"&gt;"&lt;/span&gt;&lt;span class="s"&gt;POST"&lt;/span&gt;&lt;span class="pi"&gt;]&lt;/span&gt;
        &lt;span class="na"&gt;paths&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="pi"&gt;[&lt;/span&gt;&lt;span class="s2"&gt;"&lt;/span&gt;&lt;span class="s"&gt;/mcp/*"&lt;/span&gt;&lt;span class="pi"&gt;]&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Every inter-agent communication is authenticated, &lt;br&gt;
encrypted via mTLS, and logged. Kiali visualizes &lt;br&gt;
the live traffic graph — every arrow is a real &lt;br&gt;
authenticated call.&lt;/p&gt;




&lt;h2&gt;
  
  
  Security Test Results
&lt;/h2&gt;

&lt;p&gt;AgentX-Phase2 runs 4 automated security tests on &lt;br&gt;
every deployment via &lt;code&gt;./deploy.sh --test-security&lt;/code&gt;:&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Test&lt;/th&gt;
&lt;th&gt;Scenario&lt;/th&gt;
&lt;th&gt;Result&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;TEST 1&lt;/td&gt;
&lt;td&gt;Purple agent hits s3_mcp directly — no gateway token&lt;/td&gt;
&lt;td&gt;
&lt;strong&gt;BLOCKED&lt;/strong&gt; ✅&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;TEST 2&lt;/td&gt;
&lt;td&gt;JWT token issued for correct role&lt;/td&gt;
&lt;td&gt;
&lt;strong&gt;ISSUED&lt;/strong&gt; ✅&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;TEST 3&lt;/td&gt;
&lt;td&gt;Wrong role attempts gateway access&lt;/td&gt;
&lt;td&gt;
&lt;strong&gt;BLOCKED&lt;/strong&gt; ✅&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;TEST 4&lt;/td&gt;
&lt;td&gt;Correct role, correct path&lt;/td&gt;
&lt;td&gt;
&lt;strong&gt;ALLOWED&lt;/strong&gt; ✅&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;All four pass in production. Every deployment. &lt;br&gt;
Automated. No manual verification needed.&lt;/p&gt;




&lt;h2&gt;
  
  
  Production Infrastructure
&lt;/h2&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;./deploy.sh &lt;span class="nt"&gt;--status&lt;/span&gt;

Namespace: mainframe-modernization
Pods: 7/7 running
Istio sidecars: 2/2 on every pod
Service mesh: Active
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;7 pods, all running with Istio sidecars injected. &lt;br&gt;
The 2/2 means both the application container and &lt;br&gt;
the Istio proxy are running on every pod — full &lt;br&gt;
mesh coverage.&lt;/p&gt;




&lt;h2&gt;
  
  
  Why This Matters for MCP Security
&lt;/h2&gt;

&lt;p&gt;The Model Context Protocol gives agents powerful &lt;br&gt;
tool access. That power requires governance. &lt;br&gt;
AgentX-Phase2 demonstrates that enterprise-grade &lt;br&gt;
MCP security is achievable with:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Rust middleware&lt;/strong&gt; for code-layer enforcement&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;JWT RBAC&lt;/strong&gt; for identity-based routing&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Istio&lt;/strong&gt; for network-layer zero-trust&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Automated tests&lt;/strong&gt; for continuous validation&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Solo.io's AgentGateway addresses the same problem &lt;br&gt;
at scale. AgentX-Phase2 implements these principles &lt;br&gt;
in a production multi-agent system — proving the &lt;br&gt;
pattern works end-to-end.&lt;/p&gt;




&lt;h2&gt;
  
  
  FBA Consensus — Security at the Output Layer
&lt;/h2&gt;

&lt;p&gt;Security is not just about access control. It extends &lt;br&gt;
to output quality. AgentX-Phase2 applies Byzantine &lt;br&gt;
fault-tolerant FBA consensus (arxiv:2507.11768) to &lt;br&gt;
LLM output validation:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;49 models vote independently&lt;/li&gt;
&lt;li&gt;Consensus threshold: 39 models (49-10)&lt;/li&gt;
&lt;li&gt;Production results: 44/49 above 85% confidence&lt;/li&gt;
&lt;li&gt;FBA confidence: 94%&lt;/li&gt;
&lt;li&gt;Semantic similarity: 1.0 — perfect agreement&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;A single compromised or hallucinating model cannot &lt;br&gt;
corrupt the output. The Byzantine threshold ensures &lt;br&gt;
mathematical output quality guarantees.&lt;/p&gt;




&lt;h2&gt;
  
  
  Demo Video
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://youtu.be/F7xWzoQ3e3M" rel="noopener noreferrer"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fnny6txj08ohcjo5juksq.jpg" alt="AgentX-Phase2 Security Demo" width="800" height="450"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;1:59 minutes — AWS S3 source files → cluster status &lt;br&gt;
→ 4 security tests → Kiali service mesh → GitHub&lt;/em&gt;&lt;/p&gt;




&lt;h2&gt;
  
  
  Production Results Summary
&lt;/h2&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Metric&lt;/th&gt;
&lt;th&gt;Result&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Security tests&lt;/td&gt;
&lt;td&gt;4/4 passing&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;AI models&lt;/td&gt;
&lt;td&gt;49 (48 Nebius + 1 Claude Opus 4.6)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Models above 85% confidence&lt;/td&gt;
&lt;td&gt;44/49&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;FBA confidence&lt;/td&gt;
&lt;td&gt;94%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Semantic similarity&lt;/td&gt;
&lt;td&gt;1.0&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Kubernetes pods&lt;/td&gt;
&lt;td&gt;7/7 running&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Istio sidecars&lt;/td&gt;
&lt;td&gt;2/2 on every pod&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;




&lt;h2&gt;
  
  
  Founder Background
&lt;/h2&gt;

&lt;p&gt;Venkateshwar Rao Nagala — 30+ years production &lt;br&gt;
systems experience:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;GATE 1994 AIR 444 (top 0.4%)&lt;/li&gt;
&lt;li&gt;HLASM expert — HomeComm/LifeComm at major US 
insurance carriers&lt;/li&gt;
&lt;li&gt;Core banking DDA — major North American bank&lt;/li&gt;
&lt;li&gt;Manager Big Data Analytics — AIG Fortune 500&lt;/li&gt;
&lt;li&gt;Chainlink FBA oracle — 2 LLM models (2026 Q1)&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Solo.io Velocity Award 2026&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Cilium / Isovalent Certified&lt;/li&gt;
&lt;li&gt;AgentBeats Sprint 1 — March 22, 2026&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  Links
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;GitHub:&lt;/strong&gt; &lt;a href="https://github.com/tenalirama2005/AgentX-Phase2" rel="noopener noreferrer"&gt;https://github.com/tenalirama2005/AgentX-Phase2&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Security Demo (1:59):&lt;/strong&gt; &lt;a href="https://youtu.be/F7xWzoQ3e3M" rel="noopener noreferrer"&gt;https://youtu.be/F7xWzoQ3e3M&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Full Demo (4:44):&lt;/strong&gt; &lt;a href="https://youtu.be/k4Xzbp-M2fc" rel="noopener noreferrer"&gt;https://youtu.be/k4Xzbp-M2fc&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;AgentBeats:&lt;/strong&gt; &lt;a href="https://agentbeats.dev/tenalirama2005/purple_agent" rel="noopener noreferrer"&gt;https://agentbeats.dev/tenalirama2005/purple_agent&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;LinkedIn:&lt;/strong&gt; &lt;a href="https://www.linkedin.com/in/tenalirama" rel="noopener noreferrer"&gt;https://www.linkedin.com/in/tenalirama&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Solo.io Hackathon:&lt;/strong&gt; &lt;a href="https://aihackathon.dev" rel="noopener noreferrer"&gt;https://aihackathon.dev&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;




&lt;p&gt;&lt;em&gt;Built solo, bootstrapped, from Hyderabad India.&lt;/em&gt;&lt;br&gt;&lt;br&gt;
&lt;em&gt;Vandemataram&lt;/em&gt; 🙏&lt;/p&gt;

</description>
      <category>kubernetes</category>
      <category>mcp</category>
      <category>istio</category>
      <category>rust</category>
    </item>
  </channel>
</rss>
