<?xml version="1.0" encoding="UTF-8"?><oembed><type>video</type><version>1.0</version><html>&lt;iframe src=&quot;https://www.loom.com/embed/b790d4f7728b43afa7ae342a6c596176&quot; frameborder=&quot;0&quot; width=&quot;1110&quot; height=&quot;832&quot; webkitallowfullscreen mozallowfullscreen allowfullscreen&gt;&lt;/iframe&gt;</html><height>832</height><width>1110</width><provider_name>Loom</provider_name><provider_url>https://www.loom.com</provider_url><thumbnail_height>832</thumbnail_height><thumbnail_width>1110</thumbnail_width><thumbnail_url>https://cdn.loom.com/sessions/thumbnails/b790d4f7728b43afa7ae342a6c596176-7de25bb1f4bd54b0.gif</thumbnail_url><duration>221.345</duration><title>Ensuring Secure Infrastructure Changes with AI Agents 🔒</title><description>In this video, I discuss how our AI agent can safely execute infrastructure changes to production while addressing security concerns. Axite prevents unauthorized changes by enforcing approvals and providing a clear evidence chain of what was executed. I demonstrate how the approval process works, ensuring that any discrepancies in the agent&apos;s retry will halt execution. This is crucial for maintaining accountability and security in our deployment process. Please review the approval workflow and ensure you understand your role in this process.</description></oembed>