Eno Reyes
๐ค SpeakerAppearances Over Time
Podcast Appearances
If you want a security droid, you can place it in your, you know, whatever system that you use for either pipelines or security review, and it becomes a security review agent.
If you want to expand that and make it customized to your organization, you can introduce skills and custom sub agents and all these other things that basically allow it to conform to your organization standards.
How do the agents then understand large, messy, real-world code bases versus, say, another agentic tool and how they- I think that this is one of the most interesting questions because there are several things that go into being able to explore and understand a very large code base, especially for hard problems.
I think that the three angles I would say is there's the environment.
That matters a lot.
Basically, what information does the droid have access to in order to understand?
Two, there's the droid's inherent ability to explore and search.
And three is how it handles long-term goal-directed behavior.
That third is
arguably the most important piece of research that, you know, as factories and agent research lab, and that's basically the most important piece of research is how do you do long-term goal-directed behavior?
But I think on that first point of like the environment, one thing that I think makes droids really effective in larger code bases, enterprise environments is that it, it's very, it makes it very easy for you to understand is your environment actually agent ready.
In other words, it will tell you, you know,
is Droid operating in its best environment possible?
We have tools like agent readiness that help you understand, does the code base have agents.md files?
Is it documented?
Is there linter feedback that the Droid can use to verify its own work?
And it will proactively seek those verifiers so that if it wants to explore a code base and see, hey, is this code base over here
Sorry, is this like section of the code base doing this function?
It will use, you know, grep and glob and bash and all the tools available on the computer.
But it will also look for validation and verification.