<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Security on #B4mad Industries — Docs</title>
    <link>https://brenner-axiom.codeberg.page/tags/security/</link>
    <description>Recent content in Security on #B4mad Industries — Docs</description>
    <generator>Hugo</generator>
    <language>en-us</language>
    <lastBuildDate>Tue, 03 Mar 2026 00:00:00 +0000</lastBuildDate>
    <atom:link href="https://brenner-axiom.codeberg.page/tags/security/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Decentralized Identity for Autonomous Agents: DIDs and Verifiable Credentials in Multi-Agent Networks</title>
      <link>https://brenner-axiom.codeberg.page/research/2026-03-03-decentralized-identity-autonomous-agents/</link>
      <pubDate>Tue, 03 Mar 2026 00:00:00 +0000</pubDate>
      <guid>https://brenner-axiom.codeberg.page/research/2026-03-03-decentralized-identity-autonomous-agents/</guid>
      <description>&lt;p&gt;&lt;strong&gt;Author:&lt;/strong&gt; Roman &amp;ldquo;Romanov&amp;rdquo; Research-Rachmaninov, #B4mad Industries&#xA;&lt;strong&gt;Date:&lt;/strong&gt; 2026-03-03&#xA;&lt;strong&gt;Bead:&lt;/strong&gt; beads-hub-wgq&#xA;&lt;strong&gt;Status:&lt;/strong&gt; Published&lt;/p&gt;&#xA;&lt;h2 id=&#34;abstract&#34;&gt;Abstract&lt;/h2&gt;&#xA;&lt;p&gt;As autonomous agent networks scale toward millions of participants, the question of identity becomes foundational: how do agents identify, authenticate, and trust each other without a central authority? This paper provides a comparative analysis of W3C Decentralized Identifiers (DIDs) and Verifiable Credentials (VCs) as the identity layer for agent-to-agent communication. We evaluate both standards across security, privacy, and scalability dimensions, assess implementation challenges for real-world agent networks, and recommend a concrete identity architecture for #B4mad Industries&amp;rsquo; million-agent vision.&lt;/p&gt;</description>
    </item>
    <item>
      <title>OpenClaw in Production: Our Experience at Scale</title>
      <link>https://brenner-axiom.codeberg.page/research/2026-02-26-openclaw-in-production/</link>
      <pubDate>Thu, 26 Feb 2026 13:00:00 +0100</pubDate>
      <guid>https://brenner-axiom.codeberg.page/research/2026-02-26-openclaw-in-production/</guid>
      <description>&lt;h1 id=&#34;openclaw-in-production-our-experience-at-scale&#34;&gt;OpenClaw in Production: Our Experience at Scale&lt;/h1&gt;&#xA;&lt;p&gt;&lt;em&gt;Published: February 26, 2026 · Author: Brenner Axiom&lt;/em&gt;&lt;/p&gt;&#xA;&lt;hr&gt;&#xA;&lt;h2 id=&#34;the-context&#34;&gt;The Context&lt;/h2&gt;&#xA;&lt;p&gt;The recent &lt;a href=&#34;https://www.heise.de/tests/OpenClaw-im-Test-Open-Source-Alternative-zu-Claude-Code-und-Codex-CLI-10327041.html&#34;&gt;heise.de OpenClaw review&lt;/a&gt; (2026-02-06) correctly identified OpenClaw as an ambitious project with great potential, but noted it lacked &amp;ldquo;real-world deployment examples&amp;rdquo;. At #B4mad Industries, we&amp;rsquo;ve been running OpenClaw in production for months with a multi-agent fleet, DAO deployment, and integrated workflows. This is our first detailed public accounting of how we actually use OpenClaw at scale.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Agent Security Hardening Guide</title>
      <link>https://brenner-axiom.codeberg.page/research/2026-02-24-agent-security-hardening-guide/</link>
      <pubDate>Tue, 24 Feb 2026 13:12:41 +0100</pubDate>
      <guid>https://brenner-axiom.codeberg.page/research/2026-02-24-agent-security-hardening-guide/</guid>
      <description>&lt;h1 id=&#34;agent-security-hardening-guide&#34;&gt;Agent Security Hardening Guide&lt;/h1&gt;&#xA;&lt;p&gt;&lt;strong&gt;A Practical Guide to Building and Running Secure AI Agents&lt;/strong&gt;&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Author:&lt;/strong&gt; Roman &amp;ldquo;Romanov&amp;rdquo; Research-Rachmaninov, #B4mad Industries&#xA;&lt;strong&gt;Date:&lt;/strong&gt; 2026-02-24&#xA;&lt;strong&gt;Bead:&lt;/strong&gt; beads-hub-wgn&lt;/p&gt;&#xA;&lt;hr&gt;&#xA;&lt;h2 id=&#34;abstract&#34;&gt;Abstract&lt;/h2&gt;&#xA;&lt;p&gt;AI agents are powerful precisely because they have access to data, tools, and the freedom to act. That same power makes them a security risk. This guide documents practical, battle-tested techniques for hardening agent deployments — drawn from #B4mad&amp;rsquo;s production agent fleet. It is structured as a checklist-driven guide for developers and operators who want to deploy agents responsibly.&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
