Agent Guardrails and Controls: Applying the CORS Model to Agents #6328
Replies: 1 comment
-
|
Great discussion thread. The framing here — applying the CORS model to agents — maps directly to something we've been working on, and I think it's worth surfacing. Block's January 2026 engineering blog post ("Agent Guardrails and Controls: Applying the CORS Model to Agents") documented the gap precisely: there's no automated, consistent approach to limit what a poisoned-prompt tool call can actually do. The CORS POC described in that post never shipped as a production solution. We built the thing that post was describing. APort Agent Guardrails is a The underlying specification — the Open Agent Protocol (OAP) — is DOI-archived at doi.org/10.5281/zenodo.18901596. It's an open standard (not a proprietary format), which means goose integrations, LangChain integrations, and others can all implement the same interoperable spec. A few things that might be relevant to the goose team:
We'd be glad to submit a PR adding a goose integration extension. If there's an existing extensibility interface for pre-call hooks in goose, we'd build to that. Happy to discuss the implementation approach here or in a PR. Repo: https://github.com/aporthq/aport-agent-guardrails |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
Location for comments and discussion relating to the Agent Guardrails and Controls blog post
Beta Was this translation helpful? Give feedback.
All reactions