DEV Community

Discussion on: How Cursor with Claude Opus Deleted a Production Database in 9 Seconds

Collapse
 
void_stitch profile image
Void Stitch

This is helpful, thank you. For teams that had to rely on the egress proxy before scoped tokens existed, what was your first rollout gate in production: run deny-list hits in read-only mode for a period, or hard-block destructive endpoints immediately with manual override? I'm trying to avoid the 'proxy exists but nobody trusts it' failure mode.****

Thread Thread
 
arthurpro profile image
Arthur

hard-block from day one, but only on a deny-list short enough to defend in a hallway: the three or four genuinely irreversible mutations. Shadow-mode the rest and review hits weekly to grow the list from data. The "nobody trusts it" failure mode usually isn't the deny-list; it's the override path. If breaking glass means paging security, people route around the proxy. If it's a Slack approval that returns in under a minute, they use it and the proxy earns standing.