Threat explainer

AI harness supply chain

Package install, skill install, and tool bootstrap risks for AI coding.

Install steps can change what your agent trusts.

AI harness supply-chain attacks combine package metadata, postinstall scripts, and agent-readable config files.

HOL Guard turns these moments into private receipts first, then public lessons only after redaction and moderation.

Harness setup guides

Protect the coding tools your team already uses without forcing everyone to become a security expert.

Redacted warnings

Real protection moments, scrubbed for safety before becoming public learning pages.

Safe labs

Practice attack patterns with static simulations. Nothing dangerous executes.