GUIDES · INDEX

Field notes on running agentswithout losing the keys.

Eight clusters. Real incidents, real comparisons, real CLIs. We mention hasp once at the end of each guide, in a section you can skip. The rest is the honest answer.

By cluster· pick a thread, pull it

Incidents & post-mortems

What actually happened, what the fix was, what the next one will look like.

10 published
Tool hardening

Claude Code, Cursor, Codex, Aider, MCP — locked down without breaking the loop.

10 published
Comparisons

Honest side-by-sides of brokers, vaults, scanners, and proxies.

17 published
Concepts

The mental models — grants, brokered runs, redactors, audit trails.

11 published
MCP security

Servers, clients, the new 2025/26 attack surface.

9 published
How-tos

Step-by-step, copy-pasteable, tested on a real machine.

13 published
Compliance

SOC 2, ISO 27001, NIST SSDF — mapped to what coding agents actually do.

7 published
Reference

Checklists, templates, glossaries, and lookup tables to bookmark.

6 published