| Containers |
VMs + sandboxes for agent, MCP servers, skills |
| Network |
Proxy/firewall at every layer, domain allowlisting |
| Permissions |
Read-only default, safe outputs for writes |
| Supply Chain |
Pinned action SHAs, protected CI/CD files |
| Integrity |
min-integrity, access & integrity metadata |
| Monitoring |
Threat detection, audit logs, run analysis |