<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Passkey on Start AI Tools - Presented by Intent Solutions</title><link>https://startaitools.com/tags/passkey/</link><description>Recent content in Passkey on Start AI Tools - Presented by Intent Solutions</description><generator>Hugo</generator><language>en-US</language><copyright>Intent Solutions. All rights reserved.</copyright><lastBuildDate>Thu, 09 Apr 2026 23:29:08 -0500</lastBuildDate><atom:link href="https://startaitools.com/tags/passkey/index.xml" rel="self" type="application/rss+xml"/><item><title>IRSB Agent Passkey Scaffold on Cloud Run and Perception v0.6.0 Trending</title><link>https://startaitools.com/posts/irsb-agent-passkey-cloud-run-perception-v060-trending/</link><pubDate>Fri, 06 Feb 2026 10:00:00 -0600</pubDate><guid>https://startaitools.com/posts/irsb-agent-passkey-cloud-run-perception-v060-trending/</guid><description>&lt;p&gt;Two projects, twelve commits total, and each shipped something tangible. IRSB got its first agent authentication scaffold. Perception tagged a release. Neither project had more than six commits, but both moved from &amp;ldquo;in progress&amp;rdquo; to &amp;ldquo;deployed.&amp;rdquo;&lt;/p&gt;
&lt;h2 id="irsb-agent-passkey-on-cloud-run"&gt;IRSB: Agent Passkey on Cloud Run&lt;/h2&gt;
&lt;p&gt;Six commits building the agent-passkey service from scratch and deploying it to Cloud Run.&lt;/p&gt;
&lt;h3 id="the-problem"&gt;The Problem&lt;/h3&gt;
&lt;p&gt;IRSB&amp;rsquo;s agents need to authenticate against the protocol. Traditional API keys don&amp;rsquo;t work well for autonomous agents — keys get leaked in logs, rotated keys break running agents that cached the old key, and there&amp;rsquo;s no way to scope permissions per agent instance without building a custom authorization layer on top.&lt;/p&gt;</description></item></channel></rss>