{"type":"rich","version":"1.0","provider_name":"Transistor","provider_url":"https://transistor.fm","author_name":"Tech Stories Tech Brief By HackerNoon","title":"Authorization Belongs Inside the Agent Loop (Not at the Edge)","html":"<iframe width=\"100%\" height=\"180\" frameborder=\"no\" scrolling=\"no\" seamless src=\"https://share.transistor.fm/e/81ad6bfd\"></iframe>","width":"100%","height":180,"duration":664,"description":"\n        This story was originally published on HackerNoon at: https://hackernoon.com/authorization-belongs-inside-the-agent-loop-not-at-the-edge.\n             See how continuous, context-aware policy decisions can constrain autonomous tool use—without embedding brittle authorization logic inside the agent. \n            Check more stories related to tech-stories at: https://hackernoon.com/c/tech-stories.\n            You can also check exclusive content about #openclaw, #authorization, #cedar, #agentic-ai-authorization, #runtime-policy-enforcement, #continuous-authorization, #agent-control-loop, #delegation-of-authority,  and more.\n            \n            \n            This story was written by: @windley. Learn more about this writer by checking @windley's about page,\n            and for more stories, please visit hackernoon.com.\n            \n                \n                \n                See how continuous, context-aware policy decisions can constrain autonomous tool use—without embedding brittle authorization logic inside the agent.\n        \n        ","thumbnail_url":"https://img.transistorcdn.com/IuqXIpaNNuezY7jNfIDnL5gqB1iL_SEndwUUzLGdljY/rs:fill:0:0:1/w:400/h:400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9zaG93/LzQxNDI5LzE2ODM1/ODM0NjQtYXJ0d29y/ay5qcGc.webp","thumbnail_width":300,"thumbnail_height":300}