PocketTeam moved Claude Code safety checks into runtime hooks, and OpenShell guides routed agent calls through local Ollama with zero-egress rules. Adopt staged repo tracing and review OAuth token storage before opening up tool access.

.env, destructive shell commands, and SQL like DROP DATABASE.You can jump from PocketTeam's GitHub repo to the launch post's screenshot, then over to the local-inference thread for the inference.local routing model. DeepDebug's author is trying to tame large-repo scans with budgeted passes and coverage reports, while the Cursor discussion is still stuck on a basic but important detail, where OAuth tokens actually live.
PocketTeam's most concrete change is moving guardrails out of prompt text and into the execution path. According to the author, hook code sits in front of tool calls, so blocked actions stay blocked even if the model gets prompt-injected or loses context during compaction.
The same post lists the rest of the stack as a set of runtime components, not just extra prompts:
ptbrowse, a built-in Chromium flow that uses accessibility tree snapshots at roughly 100 to 300 tokens per callpt dashboard for live agent activity, plus Telegram approvals over a native Claude Code channelThe local-inference setup in the AI_Agents thread pushes control one layer lower. The agent still thinks it is calling a normal inference endpoint, but the Privacy Router intercepts the request, rewrites it toward local Ollama, strips credentials, and pairs that with YAML rules meant to block cloud egress.
DeepDebug's author is solving a different problem, but with the same instinct: break fragile, all-in-one agent behavior into bounded stages. The scan flow runs static checks, AST passes, function-level context, and caller tracing, then reports what coverage budget it actually used.
The Cursor thread is thin on answers, but it surfaces a real implementation gap. The original poster asks whether Atlassian OAuth tokens stay only on the local machine, whether the Marketplace plugin is using Atlassian's own MCP server implementation, and who actually maintains that server.
One included reply in the same thread guesses tokens are cached under ~/.cursor, but that remains a community guess, not a cited product document. In a feed full of bigger agent ambitions, this was the most grounded unresolved question: where the credentials end up after the happy-path SSO flow finishes.