AI-First Languages, Agent Security, and Smarter Hydration in React

Published on 22.05.2026

AI & AGENTS

Zero: A Programming Language Designed for AI Agents

TLDR: Vercel's Chris Tate introduced Zero, an experimental programming language built with AI agents as the primary users. It borrows ideas from Zig and Rust and prioritizes structured outputs, a robust standard library, and one obvious path to completing any task.

Summary: The idea behind Zero is genuinely interesting, even if it sounds a little out there at first. Most programming languages were designed for humans, with all our preferences, tribal debates about style, and tolerance for ambiguity. Zero flips that assumption: what if the primary consumer of the language is an agent that needs clear, predictable paths rather than maximum expressiveness?

Zero's design principles center on a few concrete ideas. There should be one obvious way to accomplish any task, not ten. The standard library should cover the vast majority of real-world use cases so an agent doesn't need to hunt for external packages. Tooling outputs, including diagnostics, dependency graphs, size reports, and repair plans, should be structured data that an agent can consume directly rather than human-readable strings it has to parse. External system access should always be explicit and inspectable.

The current toolchain is pre-1.0 and actively warns you not to use it against production systems. That's honest. This is an exploration, not a product announcement. The syntax and APIs are unstable. But the questions it asks are worth taking seriously.

The broader debate this surfaces is real: do we need agent-specific languages, or will existing languages like TypeScript and Rust simply grow better tooling and conventions for AI interaction? I don't know the answer yet, and I don't think anyone does. But Zero is at least asking the right questions in a concrete, runnable way, which is more than most whitepaper proposals manage.

Key takeaways:

  • Zero is an experimental language built for agents as primary users, not humans
  • Prioritizes a single obvious path, a large standard library, and machine-readable tooling output
  • Inspired by Zig and Rust; currently pre-1.0 and not suitable for production use
  • Raises a real question: do agents need their own languages or just better tooling around existing ones?

Why do I care: The agent-first language idea sounds like a niche experiment until you think about what agents actually struggle with. Context overload, ambiguous APIs, and dependency hell are exactly the things that cause agents to hallucinate bad solutions. A language that produces structured diagnostics and repair metadata isn't just nice to have, it's a direct attack on the failure modes I've watched agents hit repeatedly. Whether Zero specifically succeeds matters less than whether this design space gets serious attention.

Zero | An agent-first language experiment.


Claw Patrol: Deno's Open-Source Security Firewall for AI Agents

TLDR: Deno open-sourced Claw Patrol, a security firewall that sits outside AI agents and controls what they can actually do, including parsing SQL verbs, Kubernetes actions, and HTTP calls, with support for chaining human approvals in Slack.

Summary: The problem Claw Patrol solves is one that every team giving agents production access will eventually hit, usually painfully. Agents are handed credentials to AWS, Postgres, GitHub, Kubernetes, and Slack. Most existing security tooling watches the LLM call or gates HTTP requests, but agents also speak Postgres, SSH, and kubectl directly. There's a real gap between "we have an LLM gateway" and "we've actually locked down what our agent can do to production."

Claw Patrol routes agent traffic through a WireGuard or Tailscale tunnel to a gateway that terminates TLS, parses the inner protocol, holds the real credentials, and evaluates each request against rules written in HCL. One of Deno's own rules denies reads of Kubernetes secrets across their deploy clusters entirely. Another chains an LLM tone check with a human Slack approval before the agent sends any customer-support reply.

The credential model is worth paying attention to. Credentials live on the gateway, not the agent. The agent sends a placeholder like a token name and the gateway swaps in the real value on the wire. A compromised agent process can't leak keys it never held. That's a clean architecture.

Claw Patrol is currently alpha and MIT-licensed. The protocol support reflects what Deno actually needed, which means Postgres, Kubernetes, and HTTP are covered but more exotic protocols will need community contributions. The five-minute getting-started guide is a good sign that the team thought about adoption.

Key takeaways:

  • Security firewall that sits outside the agent and evaluates outbound calls by protocol, SQL verb, Kubernetes resource, etc.
  • Credentials live on the gateway, not the agent process
  • Supports chaining approvers: LLM policy check, human in Slack, or both
  • Currently alpha and MIT-licensed; protocol support depends on community contributions

Why do I care: This is exactly the kind of infrastructure that turns "we're experimenting with agents" into "we trust agents in production." The LLM gateway products are fine for controlling model calls, but they miss the entire surface area of what an agent actually touches. An agent that can drop a Postgres table or delete a Kubernetes namespace doesn't care that you have a guardrail on the OpenAI API. Claw Patrol attacks the right problem at the right layer.

Claw Patrol: an open-source security firewall for agents | Deno


TanStack Start Gets Deferred Hydration

TLDR: TanStack Start added experimental support for deferred hydration, letting you mark sections of a page as non-interactive on initial load and only hydrate them when they're visible, idle, interacted with, or match a media query.

Summary: If you've worked on large React pages with server-side rendering, you know the startup tax. The browser fetches the server HTML, React boots up, and then hydrates the entire document before anything is truly interactive. On big pages with reviews sections, carousels, maps, and rich editors, that hydration work is doing a lot for parts of the page the user may never scroll to.

TanStack Start's deferred hydration lets you wrap components in a Hydrate boundary and specify when that boundary should become interactive. The strategies available include visible (when it enters the viewport), idle (during browser idle time), interaction (on focus or click), media (when a CSS media query matches), condition (when a boolean becomes true), and never (the server HTML stays static and never hydrates at all). The compiler also moves boundary children into a separate JavaScript chunk by default, so the browser doesn't even download that code until it needs to.

There's a useful distinction to understand between this and React's selective hydration. Selective hydration controls the order in which already-queued boundaries hydrate. Deferred hydration controls whether a boundary is in the queue at all. The two compose: once a deferred boundary opens, the React scheduler takes over for anything inside it.

The guidance on what makes a good candidate for deferral is practical. Below-the-fold reviews, video players, recommendation carousels, and static marketing sections are good fits. Primary navigation, checkout buttons, and anything the user might interact with immediately after landing are poor fits. The comparison with Astro's Islands model is also worth reading: Astro starts static and asks what should come alive, while TanStack Start starts fully interactive and asks what can wait.

Key takeaways:

  • Wrap components in a Hydrate boundary with a strategy like visible(), idle(), or interaction()
  • The compiler splits boundary children into separate JavaScript chunks by default
  • never() keeps server HTML static and never loads the boundary's JavaScript
  • Deferred hydration controls queue membership; React's selective hydration controls queue order
  • Still experimental, but available now in TanStack Start

Why do I care: This is the kind of performance primitive that pays off on real e-commerce and content pages where the above-the-fold experience is fast and important but the rest of the page is heavy. I've seen teams spend significant effort manually code-splitting review sections and below-the-fold widgets. Having a declarative, compiler-backed way to say "this content is visible but not interactive yet" is a meaningful reduction in the amount of custom hydration infrastructure teams have to maintain.

Deferred Hydration | TanStack Start React Docs


GitHub Copilot App Launches for Agentic Development

TLDR: GitHub launched a dedicated desktop app called "GitHub Copilot app" (yes, that's really the name) designed for running AI agents in parallel workstreams alongside full GitHub integration and PR lifecycle management.

Summary: GitHub's new desktop application is purpose-built for what they're calling agent-driven development, the workflow where you're directing multiple AI agents running in parallel rather than writing code yourself directly. The app bundles GitHub Copilot CLI with native GitHub integration, meaning your repositories, branches, and CI pipelines connect without extra configuration.

The core idea is reducing the context switching between your terminal, IDE, and browser tabs that happens when you're managing several agent workstreams at once. You get a single interface for tracking what each agent is doing, working with issues and pull requests, and managing the development lifecycle from idea to merged PR.

It's currently in public preview. Copilot Business and Enterprise subscribers have access now, while Pro and Pro+ subscribers can sign up for early access. The app is available for Mac (both Apple Silicon and Intel), Windows, and Linux.

The naming deserves its own moment of recognition. Calling it "GitHub Copilot app" when GitHub is already an app and Copilot is already a product inside it is the kind of naming decision that will confuse search results for years. The newsletter referenced OpenAI's school of naming things, and the comparison is fair.

Key takeaways:

  • Desktop application for managing AI agent workstreams with full GitHub integration
  • Built on GitHub Copilot CLI; available for Mac, Windows, and Linux
  • Currently in public preview for Business and Enterprise Copilot subscribers
  • Pro and Pro+ subscribers can sign up for early access

Why do I care: The promise here is real even if the execution will need time to mature. Running parallel agent workstreams from a single interface is the natural next step once you accept that agents are going to be doing a substantial portion of the implementation work. What I'll be watching for is whether the PR lifecycle management actually reduces review friction or just moves the context switching somewhere new.

GitHub - github/app: This is the home for releases and issues for the GitHub Copilot app


DiffsHub: View Large GitHub Diffs Without Melting Your Browser

TLDR: The Pierre Computer Company launched DiffsHub, a tool that lets you view any public GitHub diff by replacing "github.com" with "diffshub.com" in the URL, with a virtualized interface that handles diffs GitHub itself struggles with.

Summary: GitHub's diff viewer is fine until it isn't. Paste a PR with a thousand changed files, or try to compare two major version tags on a large project, and you'll find yourself staring at a loading spinner or a browser tab that quietly consumes 4GB of RAM before giving up. GitHub even admits it serves diffs over 100,000 lines unreliably, with delayed first bytes being a known issue.

DiffsHub solves this by building a virtualized interface specifically for reading large diffs. The workflow is minimal: take any public GitHub URL for a PR, comparison, commit, or patch, and swap the domain to diffshub.com. That's the entire onboarding story. It works for comparisons like comparing two major releases of the Linux kernel across millions of lines, though the team honestly notes that can crash mobile browsers.

The tool is built on their FileTree and CodeView components from Pierre, and the interface is described as fast and visually clean.

Key takeaways:

  • Replace "github.com" with "diffshub.com" in any public GitHub diff URL
  • Built for large diffs that GitHub renders slowly or not at all
  • Handles PRs, comparisons, commits, and patches
  • Built by The Pierre Computer Company

Why do I care: This is one of those tools where the thirty-second demo is the entire pitch. If you've ever had to review a major dependency upgrade or a big refactor that GitHub refused to render properly, you'll use it immediately. The virtualized approach for large diffs is the right call, and making it a URL swap rather than a separate import workflow keeps the friction low enough that people will actually reach for it.

DiffsHub, from Pierre


npm Adds Staged Publishing for Packages

TLDR: The npm team added staged publishing, which requires an additional human approval step before packages go live on the registry.

Summary: The npm ecosystem has had a supply chain security problem for a while, and staged publishing is a targeted response to one specific failure mode: packages being published immediately without any review step. With staged publishing, a package doesn't go live the moment you run publish. It sits in a staging state waiting for an authorized approver to let it through.

This matters more now that agents are writing and publishing code. An agent with npm publish access and no staged publishing is one hallucination away from pushing something unfortunate to a public package. Adding an approval gate in the registry itself, rather than relying on CI/CD configurations that can be bypassed or misconfigured, is the right place to put that control.

The feature is opt-in, so existing publishing workflows are not disrupted. Teams with automated publishing pipelines that are already well-guarded will need to decide whether the additional step is worth it for their situation.

Key takeaways:

  • npm packages can now require manual approval before going live on the registry
  • Adds a staging state between running publish and the package being publicly available
  • Particularly relevant for teams using agents or automated pipelines to publish packages
  • Opt-in, so existing workflows are unaffected unless you enable it

Why do I care: Supply chain attacks through npm have caused real damage, and most of the incidents I can think of came from a combination of compromised credentials and immediate publish access. Staged publishing doesn't solve everything, but it puts a speed bump between "the credentials were used" and "the malicious package is in the wild." In an era where agents are accumulating publish permissions, that speed bump is worth having.

Bytes #489 - AI's Love Language