More Open Source Security episodes

MCP and Agent security with Luke Hinds thumbnail

MCP and Agent security with Luke Hinds

Published 16 Mar 2026

Duration: 35:36

The text explores AI agent security risks like prompt injection and open-source vulnerabilities, emphasizing the No-NO project's kernel-based sandboxing with a deny-by-default model, hardware enclaves, and Rust-driven efficiency, alongside layered defenses, restricted commands, and collaborative efforts to tackle evolving threats like social engineering and insecure coding practices.

Episode Description

Josh talks to Luke Hinds, CEO of Always Further, about MCP and agent security. We start out talking about Luke's new tool, nono which is a sandboxing...

Overview

The text discusses the development of No-NO, a security tool created by Always Further, a startup focused on addressing vulnerabilities in AI agents and models. No-NO leverages kernel-based sandboxing to isolate processes, preventing data exfiltration, unauthorized file access, and destructive actions like rm -rf, using a deny-by-default model and hardware security enclaves (e.g., Apples Secure Enclave). Designed for speed and simplicity, it contrasts with Docker by enabling near-instant startup times and minimal user configuration, though it is not intended as a replacement but a complementary tool for specific use cases. The tool also incorporates restricted commands, time-based command allocation, and rollback mechanisms to mitigate risks like accidental deletions or unauthorized API interactions.

Broader challenges in AI security are highlighted, including the unpredictability of AI agents (e.g., bypassing sandboxing) and vulnerabilities in MCP servers (Model-Controller-Proxy), which enable AI models to execute external functions. Risks include supply chain vulnerabilities in open-source tools, prompt injection attacks, and the merged control/data architecture of large language models (LLMs), which make them susceptible to social engineering and data leaks. Historical parallels are drawn to early hacking exploits, such as the "2600 Hz" phone fraud, emphasizing the persistent difficulty of securing systems against autonomous, high-dimensional threats. The text also stresses the need for collaborative solutions, education in secure development practices, and tools that balance simplicity for non-experts with customization options for professionals, while addressing the growing gap between rapid AI innovation and robust security frameworks.

Recent Episodes of Open Source Security

11 May 2026 Open source is critical infrastructure with Kat Cosgrove

Maintaining open source infrastructure is critical to prevent security risks from neglected projects, highlighting the need for sustainable funding, corporate collaboration beyond financial support, and systemic reforms to address coordination challenges, dependency fragility, and vulnerabilities.

4 May 2026 How to actually test a disaster plan with David Bernstein

A three-part disaster recovery framework emphasizing simplicity, clear roles, and collaboration, utilizing structured testing via HSEEP, real-world validation, and continuous improvement through exercises, while addressing pitfalls and balancing realism with psychological safety.

27 Apr 2026 Open Source Pledge with Vlad-Stefan Harbuz

Challenges in open source sustainability include undervaluing maintainers, dependency tracking issues, fragmented tooling, burnout, governance flaws, and paradoxical tool sustainability, necessitating financial support, sustainable governance, and collective action for long-term project viability.

20 Apr 2026 Building a plan for disaster with David Bernstein

Adaptive emergency management and disaster recovery demand dynamic strategies, structured frameworks like ISO 22301/NIST, cyclical preparedness, stress testing, stakeholder alignment, and resilience through collaboration and continuous learning to tackle evolving digital and physical risks.

13 Apr 2026 Open Source Malware with Paul McCarty

Open Source Malware (OSM) addresses the gap in detecting intentional malicious open-source components by cataloging threats, de-obfuscating code, extracting indicators of compromise, and providing post-incident data, while tackling challenges like persistent malicious packages, limitations of traditional tools against interpreted languages, fragmented collaboration, AI risks, and the need for improved CI/CD security, audit tools, and balanced AI-human oversight.

More Open Source Security episodes