Agent Zero is a powerful open-source AI agent framework. Out of the box it is built for developer convenience, but deploying it in a corporate environment exposes several attack surfaces. This is what I hardened and why each change matters.

1. RFC (Remote Function Call) Endpoint — Disabled in Production

Agent Zero includes an RFC mechanism that lets the container call arbitrary Python functions on the host. In Docker mode this endpoint serves no legitimate purpose, but it was left enabled — meaning anyone who could reach the API could invoke os, subprocess, or any other Python module.

What I did:

2. Skill Approval Workflow — Human-in-the-Loop Before Execution

Agent Zero can import and execute "skills" — small Python/markdown programs. Previously, imported skills were immediately active with no review step. A malicious or compromised skill source could push code straight into execution.

What I did:

3. Browser Agent Hardening

The browser agent was configured with disable_security=True and accept_downloads=True — essentially a fully permissive headless browser running inside your network.

What I did:

4. Docker Hardening

The default compose file bound the agent port to 0.0.0.0 (all interfaces), used a bind mount of the entire project directory, and used the standard public image.

What I did:

None of these issues are bugs — they are deliberate design choices for developer ergonomics. The security work is about adding the right controls for a production corporate deployment: least-privilege execution, human approval gates, and network containment.