| https://github.com/EphyrAI/Ephyr Hey everyone, I wanted to introduce Ephyr...because giving an autonomous agent a permanent API key or an open SSH session is pretty suboptimal. Goal: To start, I would like to say, I'm not pitching this as a production ready, polished tool. It is a prototype. I think its ready for the selfhosted community, r/homelab and similar. But I'm really hoping to get input on the architecture and the technical approach to make sure I have no glaring holes. With that said...the tool: Current State: If an orchestrator agent spawns a sub-agent to handle a subtask, it usually just passes down its own credentials. The Model Context Protocol (MCP) is a great transport layer, but it completely lacks a permission propagation and identity layer. How I got here: I had actually been working on a simple access broker for SSH keys so I could use Claude Code to manage infa in my homelab (initially internal as 'Clauth'). A few weeks ago, Google DeepMind published Intelligent AI Delegation (arXiv:2602.11865), and I saw some interesting similarities. Solution: Their paper highlighting this gap and proposing the use of Macaroons as "Delegation Capability Tokens". Ephyr is an open-source, production-ready implementation of that architecture. It sits between agent runtimes and infrastructure, replacing standing credentials with task-scoped, cryptographically attenuated Macaroons. A few architectural decisions I thought folks might appreciate:
The broker currently supports ephemeral SSH certificate issuance, HTTP credential injection, and federated MCP server routing. Performance-wise, auth takes <1ms, Macaroon verification takes ~32µs, and the full PoP pipeline runs in ~132µs. I've included highly detailed security and identity whitepapers (in docs/whitepapers/) and a full threat model (docs/THREAT_MODEL.md) in the repository. Caveats: I think it goes without saying in this sub, but I did use AI and agentic development tools in the process (namely CC), but I professionally I have spent most of my career in cybersec/machine learning/data science space, so I try and get in the minutia and code as much as possible. The architecture is my own, but built on fundamental building blocks and research that came before me. [link] [comments] |
Ephyr: An Architecture and Tool for Ephemeral Infrastructure Access for AI Agents
Reddit r/LocalLLaMA / 3/18/2026
📰 NewsDeveloper Stack & InfrastructureTools & Practical Usage
Key Points
- Ephyr introduces an architecture and tool that replaces permanent credentials with task-scoped, cryptographically attenuated Macaroons to enable ephemeral infrastructure access for AI agents.
- It uses Macaroons as Delegation Capability Tokens to provide a permission propagation and identity layer between agent runtimes and infrastructure, addressing gaps in the Model Context Protocol (MCP).
- The project emphasizes a lean, security-focused design by implementing Macaroons with pure stdlib Go code to minimize supply-chain risk and allow deployment on lightweight hardware like a Raspberry Pi.
- The author presents Ephyr as a prototype aimed at the self-hosted and homelab communities and invites feedback on architecture and safety, with links to ephyr.ai and the GitHub repository.
Related Articles
MCP Is Quietly Replacing APIs — And Most Developers Haven't Noticed Yet
Dev.to
Stop Guessing Your API Costs: Track LLM Tokens in Real Time
Dev.to
Your AI Agent Is Not Broken. Your Runtime Is
Dev.to
Building an AI-Powered Social Media Content Generator - A Developer's Guide
Dev.to
I Built a Self-Healing AI Trading Bot That Learns From Every Failure
Dev.to