Conversation
There was a problem hiding this comment.
Pull request overview
Updates documentation to clarify that the AWF api-proxy is primarily a routing layer (and still subject to AWF network controls), and should not be treated as a standalone caller-auth boundary for arbitrary code already running inside the agent container.
Changes:
- Refines the “custom API endpoints via env vars” documentation to clarify the proxy’s role and limits as an auth boundary.
- Updates the security architecture write-up to describe the API proxy as a routing layer that may hold engine-specific credentials/configuration.
- Adds explicit guidance that some engine integrations may still require credentials inside the agent container for CLI compatibility.
Reviewed changes
Copilot reviewed 2 out of 2 changed files in this pull request and generated 3 comments.
| File | Description |
|---|---|
| docs/src/content/docs/reference/engines.md | Clarifies proxy routing behavior and explicitly narrows the implied auth-boundary guarantees. |
| docs/src/content/docs/introduction/architecture.mdx | Updates Layer 1 and architecture summary text to describe the API proxy as routing (and not a universal credential-isolation boundary). |
💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.
|
Hey That said, there's one process concern to flag:
No test changes are needed for a docs-only clarification like this — that's expected and fine. If you'd like a core team member to fast-track this, you can assign the following prompt to a coding agent:
|
Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com>
Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com>
Co-authored-by: lpcox <15877973+lpcox@users.noreply.github.com> Agent-Logs-Url: https://github.com/github/gh-aw/sessions/41a073e3-894e-45e1-b69d-11072a80672a
Clarifies that the AWF api-proxy is a routing layer, not a separate caller-auth boundary for arbitrary code already running inside the agent container.