Launch HN: Terminal Use (YC W26) – Vercel for filesystem-based agents
Terminal Use launches as a Vercel-like platform for deploying filesystem-based AI agents, addressing the complex pain points of sandboxing, state management, and file persistence. This "Launch HN" sparks extensive debate on whether specialized infrastructure is truly necessary for agents, or if existing Kubernetes setups suffice, alongside deep dives into its novel filesystem abstraction. The discussion highlights the evolving needs for secure, manageable, and performant agent deployments, distinguishing them from traditional microservices.
The Lowdown
Terminal Use, founded by Filip, Stavros, and Vivek (YC W26), introduces a new platform designed to simplify the deployment of AI agents that require sandboxed environments and filesystem access, such as coding or research agents. The founders emphasize that existing solutions demand extensive "stitching together" for packaging, sandboxing, streaming messages, state persistence, and file management.
Key aspects of Terminal Use include:
- Simplified Deployment: Agents are packaged from a repo using
config.yamland aDockerfile, deployed via a CLI. It defineson_create,on_event, andon_cancelendpoints for task lifecycle management. - SDK Compatibility: Supports Claude Agent SDK and Codex SDK out-of-the-box, with an adapter converting messages. It's also Vercel AI SDK v6 compatible for custom harnesses.
- First-Class Filesystems: A core differentiator is treating filesystems as independent primitives. This decouples storage from task lifecycles, enabling persistent workspaces across tasks, sharing between agents, and direct user file uploads/downloads via presigned URLs.
- Enhanced Developer Experience: The decoupled filesystem allows for easy iteration, bug fixes, versioning, and auto-migration of tasks. It supports modern deployment practices like CLI, preview/production environments, git-based targeting, logs, and rollback, all configured via
config.yamlfor CI/CD. - Testing Workflow: A dedicated CLI allows coding agents to send messages to deployed agents and download filesystem contents for debugging and understanding outputs.
- Roadmap: Future plans include multi-filesystem mounts and eventually full parity with general-purpose sandbox providers (e.g., preview URLs, lower-level
sandbox.exec(...)APIs).
Terminal Use aims to provide an opinionated, streamlined experience for agent developers, abstracting away much of the underlying infrastructure complexity to let them focus on agent logic.
The Gossip
Kubernetes vs. Dedicated Agent Infrastructure
A central debate revolved around the necessity of specialized agent platforms like Terminal Use versus leveraging existing Kubernetes infrastructure. Many commenters questioned why new tools were needed when K8s offers robust container orchestration. Proponents of dedicated agent platforms argued that K8s, while powerful, requires significant "glue code" for granular per-task authorization, ephemeral runtimes, and managing the unique non-deterministic nature of agents, which extends beyond simple container health checks. They highlighted that agent-specific platforms aim to provide higher-level abstractions for agent lifecycle management, security, and observable actions that K8s doesn't inherently address.
Filesystem Abstraction: The Technical Deep Dive
The story's emphasis on "filesystems as first-class primitives" sparked detailed technical discussion. Commenters speculated on the implementation, with one insightful analysis suggesting a "copy-on-mount backed by object storage" approach, praising its performance advantages over FUSE for agent workloads. While acknowledging the value of structural persistence, the discussion extended to the challenge of "semantic continuity"—how agents truly understand and utilize persistent state across invocations, suggesting a need for intelligent summarization or queryable state layers above raw files.
Agent Security, Authorization, and Rollback Challenges
The unique security implications of autonomous agents were a significant point of concern. Commenters emphasized the need for "per-task authorization scope" to limit agent capabilities dynamically, along with an auditable ledger of actions, which are not easily solved by standard infrastructure. The risk of "exfiltration via prompt injection" was also raised. The founders acknowledged the complexity of rollback, especially for agents performing real-world actions, and expressed interest in guiding agents to gather context and make decisions before taking irreversible steps.
The Agent Interface: CLI vs. IDE Debate
A lively side discussion questioned the utility of CLI-focused coding agents, contrasting them with the richer context and debugging capabilities offered by modern Integrated Development Environments (IDEs). Some commenters expressed frustration with the "hype" around CLI agents, arguing that they often recreate functionalities already present in IDEs without adding tangible value, and that "context engineering" or agent skills matter more than the interface itself.