HN
Today

Launch HN: Terminal Use (YC W26) – Vercel for filesystem-based agents

Terminal Use launches as a Vercel-like platform for deploying filesystem-based AI agents, addressing the complex pain points of sandboxing, state management, and file persistence. This "Launch HN" sparks extensive debate on whether specialized infrastructure is truly necessary for agents, or if existing Kubernetes setups suffice, alongside deep dives into its novel filesystem abstraction. The discussion highlights the evolving needs for secure, manageable, and performant agent deployments, distinguishing them from traditional microservices.

62
Score
50
Comments
#3
Highest Rank
7h
on Front Page
First Seen
Mar 9, 5:00 PM
Last Seen
Mar 9, 11:00 PM
Rank Over Time
34559810

The Lowdown

Terminal Use, founded by Filip, Stavros, and Vivek (YC W26), introduces a new platform designed to simplify the deployment of AI agents that require sandboxed environments and filesystem access, such as coding or research agents. The founders emphasize that existing solutions demand extensive "stitching together" for packaging, sandboxing, streaming messages, state persistence, and file management.

Key aspects of Terminal Use include:

  • Simplified Deployment: Agents are packaged from a repo using config.yaml and a Dockerfile, deployed via a CLI. It defines on_create, on_event, and on_cancel endpoints for task lifecycle management.
  • SDK Compatibility: Supports Claude Agent SDK and Codex SDK out-of-the-box, with an adapter converting messages. It's also Vercel AI SDK v6 compatible for custom harnesses.
  • First-Class Filesystems: A core differentiator is treating filesystems as independent primitives. This decouples storage from task lifecycles, enabling persistent workspaces across tasks, sharing between agents, and direct user file uploads/downloads via presigned URLs.
  • Enhanced Developer Experience: The decoupled filesystem allows for easy iteration, bug fixes, versioning, and auto-migration of tasks. It supports modern deployment practices like CLI, preview/production environments, git-based targeting, logs, and rollback, all configured via config.yaml for CI/CD.
  • Testing Workflow: A dedicated CLI allows coding agents to send messages to deployed agents and download filesystem contents for debugging and understanding outputs.
  • Roadmap: Future plans include multi-filesystem mounts and eventually full parity with general-purpose sandbox providers (e.g., preview URLs, lower-level sandbox.exec(...) APIs).

Terminal Use aims to provide an opinionated, streamlined experience for agent developers, abstracting away much of the underlying infrastructure complexity to let them focus on agent logic.

The Gossip

Kubernetes vs. Dedicated Agent Infrastructure

A central debate revolved around the necessity of specialized agent platforms like Terminal Use versus leveraging existing Kubernetes infrastructure. Many commenters questioned why new tools were needed when K8s offers robust container orchestration. Proponents of dedicated agent platforms argued that K8s, while powerful, requires significant "glue code" for granular per-task authorization, ephemeral runtimes, and managing the unique non-deterministic nature of agents, which extends beyond simple container health checks. They highlighted that agent-specific platforms aim to provide higher-level abstractions for agent lifecycle management, security, and observable actions that K8s doesn't inherently address.

Filesystem Abstraction: The Technical Deep Dive

The story's emphasis on "filesystems as first-class primitives" sparked detailed technical discussion. Commenters speculated on the implementation, with one insightful analysis suggesting a "copy-on-mount backed by object storage" approach, praising its performance advantages over FUSE for agent workloads. While acknowledging the value of structural persistence, the discussion extended to the challenge of "semantic continuity"—how agents truly understand and utilize persistent state across invocations, suggesting a need for intelligent summarization or queryable state layers above raw files.

Agent Security, Authorization, and Rollback Challenges

The unique security implications of autonomous agents were a significant point of concern. Commenters emphasized the need for "per-task authorization scope" to limit agent capabilities dynamically, along with an auditable ledger of actions, which are not easily solved by standard infrastructure. The risk of "exfiltration via prompt injection" was also raised. The founders acknowledged the complexity of rollback, especially for agents performing real-world actions, and expressed interest in guiding agents to gather context and make decisions before taking irreversible steps.

The Agent Interface: CLI vs. IDE Debate

A lively side discussion questioned the utility of CLI-focused coding agents, contrasting them with the richer context and debugging capabilities offered by modern Integrated Development Environments (IDEs). Some commenters expressed frustration with the "hype" around CLI agents, arguing that they often recreate functionalities already present in IDEs without adding tangible value, and that "context engineering" or agent skills matter more than the interface itself.