Is Slow Growth Better Than Viral Hype in Open Source?

“I think many developers underestimate slow consistent growth.”

A lot of people today chase viral posts, huge GitHub stars, fast hype, and massive launch numbers.

But honestly, I am starting to wonder if slow steady growth is actually better for most open source projects.

This is the current result of my open source project after roughly 1 month:

  • 8 stars
  • 4 forks
  • 5 contributors
  • 12 closed issues
  • 42 pull requests
  • 146 commits

And while those numbers are not “viral”, they still represent something important.

  • Real activity.
  • People contributing.
  • Issues getting solved.
  • The repository improving little by little over time.

I think social media sometimes creates unrealistic expectations around open source.

Many developers feel like a project is only successful if it explodes immediately or gains thousands of stars very quickly.

But most real projects probably grow much slower than that.

And honestly, slower growth may actually help maintainers learn properly.

It gives time to:

  • improve architecture
  • organize the repository
  • fix mistakes
  • build consistency
  • understand how to maintain a project long term

I am still learning all of this myself.

Some days I honestly wonder if the project is growing too slowly.

But at the same time, seeing contributors appear, pull requests open, and issues get solved makes me feel like steady progress still matters.

Maybe consistency is more important than hype after all.

Slow growth vs viral hype in open source

Final Thought

I would rather build a project that grows slowly for years than a project that goes viral for one week and then disappears.

What do you think is more important in open source:

  • steady growth
  • or fast viral attention?

Why Agent Payment Authorization Cannot Come from the Agent Itself

There is a moment in security design when a single observation changes everything. NanoClaw 2.0 shipped recently with a capability that stops most developers cold: a gateway that intercepts API credentials before they reach the agent. The agent sees only a placeholder. The real key never touches the application layer.

The founder explained the reason in one sentence: “If the agent generates the approval UI, it could swap the Accept and Reject buttons.”

Read that again. If the agent controls the authorization interface, the agent controls the authorization decision. The concept of checking with the agent before proceeding collapses when the agent is both the actor and the approver. This applies directly to payments. More directly than most developers realize.

The Authorization Paradox

When AI agents make payments through application-level controls, the execution flow looks like this:

You have just asked the agent to audit itself. The guardrails live inside the same process that generated the intention to spend. This is not security. It is theater.

The consequences are not theoretical. In 2026, a Meta internal agent posted to employee forums without authorization after misinterpreting a task. This triggered a Severity 1 security incident. A bad post can be deleted. A bad payment cannot be reversed. Stablecoin transactions on Base are final.

What Infrastructure-Level Authorization Actually Means

NanoClaw treats authorization as a layer that exists below the application. The agent cannot inspect or manipulate it. When the agent sends an action, the gateway intercepts, evaluates the policy, and either injects the real credential or rejects the request. The agent never touches the decision.

The same architecture applies to payments in rosud-pay. Payment credentials are not stored in the agent. The agent holds a scoped token that defines what it can do: which merchants, what amounts, what frequency. When the agent initiates a payment, rosud-pay evaluates the token against the policy at the infrastructure layer. The agent’s own logic is irrelevant to the authorization decision.

// Agent receives a scoped payment token at deployment time
const agent = new RosudAgent({
  paymentToken: process.env.ROSUD_SCOPED_TOKEN,
  // Token pre-configured: maxAmount, allowedMerchants, spendWindow
});

// Agent initiates payment -- authorization happens at infrastructure layer
const result = await agent.pay({
  to: 'vendor-123',
  amount: 0.50,
  currency: 'USDC',
  memo: 'API call to data provider'
});

// Agent cannot override a policy rejection
if (!result.authorized) {
  console.log('Payment rejected:', result.reason);
  // e.g. "exceeds spendWindow limit" or "merchant not in allowList"
}

The agent never sees the underlying USDC wallet. It never accesses the cryptographic signing keys. It cannot construct a payment outside the defined scope. Even if the agent’s reasoning is compromised by a prompt injection attack, the payment rail does not move.

Why Payments Are Harder Than API Access

NanoClaw’s design protects API credentials. rosud-pay protects something harder: real monetary value on-chain.

When an agent calls an API incorrectly, you get a failed request. You retry. You fix the logic. The cost is latency and compute. When an agent executes an unauthorized payment, you have moved USDC from one wallet to another. There is no chargeback, no dispute window, no fraud team to call.

The enterprise is beginning to understand this. Retool’s 2026 developer survey found that 60% of enterprise AI tools were deployed without IT oversight. Shadow IT became shadow AI. The next step in that progression is shadow payment: agents making financial decisions that no human approved and no audit trail covers.

The Pattern That Actually Works

The architecture is straightforward:

  • Payment authorization lives at the infrastructure layer, not inside the agent
  • Agents receive scoped tokens with defined limits: merchant, amount, time window
  • Every payment attempt is logged to an immutable audit trail before execution
  • Limits are enforced cryptographically, not by trusting the agent’s self-reported behavior
// Define the token scope at deployment, not at runtime
const scopedToken = await rosud.createAgentToken({
  agentId: 'procurement-agent-v2',
  policy: {
    maxSinglePayment: 50,        // USDC
    dailySpendLimit: 500,        // USDC
    allowedMerchants: ['data-provider-a', 'api-service-b'],
    expiresIn: '7d'
  }
});

// Deploy agent with token -- agent never sees the private key
await deployAgent({ paymentToken: scopedToken.value });

// All payment attempts are logged and enforced at infrastructure level
// Violations are rejected before execution, not after

This is not about distrusting your agents. It is about recognizing that an agent’s authorization boundary should be established at deployment time, not derived from the agent’s in-context judgment.

The Line That Should Not Move

NanoClaw proved the principle for API access. rosud-pay applies it where the stakes are highest: the moment an autonomous agent moves money.

The rule is simple. An agent should never be the entity deciding whether the agent should pay. That decision belongs at a layer the agent cannot reach.

If you are building autonomous agents that handle real transactions, rosud-pay is the infrastructure-level payment authorization layer designed for exactly this. The full documentation is at rosud.com/docs.

72% of Enterprises Think They Control Their AI. Ask Them What Their Agents Are Spending.

A VentureBeat survey of 40 enterprise organizations published in Q1 2026 found that 72% of enterprises believe they have meaningful control over their AI deployments. They have dashboards. They have policies. They have vendor contracts with safety clauses.

Ask them one question and the illusion breaks: what did your AI agents spend this week?

Silence.

Enterprise AI governance in 2026 has a systematic blind spot. Everyone is watching what agents say, what data they access, which models they call. Nobody is watching what they spend. And in a world where agents are increasingly authorized to make purchases, call paid APIs, and process transactions, that blind spot is a financial risk that compounds quietly.

Shadow AI Became Shadow Spending

Retool’s 2026 Build vs. Buy Shift report surveyed 817 professionals and found that 60% of enterprise builders had created AI tools and workflows without IT oversight. A quarter of them did this frequently.

These tools were connected to production data. They were running automated workflows. They had API keys.

Now consider: many of those same tools are calling external APIs. Some are calling paid APIs. Some are triggering purchases, processing invoices, or executing micro-transactions in automated pipelines.

The governance layer that was supposed to audit these actions? It was never built for the payment surface.

Mass General Brigham, with 90,000 employees, had to build a custom security layer on top of Microsoft Copilot because the platform’s native governance could not account for the real-world workflows running on top of it. The same gap exists at nearly every enterprise running multiple AI platforms simultaneously.

The Three Governance Failures

When we map enterprise AI governance onto payment workflows, three failure modes emerge consistently.

1. Credential Sprawl

An agent that calls OpenAI, Anthropic, a third-party data enrichment API, and a payment processor is using four separate credential chains. Each one has different scope, different expiry, different audit trail. The IT team sees none of it as a single coherent spend profile.

Result: you cannot answer the question ‘what did our AI cost us this month’ with any accuracy.

2. Budget Without Enforcement

Most enterprise AI budget controls exist at the procurement level. A team is allocated $10,000 for AI APIs. But at the agent execution level, there is no real-time enforcement. An agent can exceed the monthly budget in a day of unexpected behavior, and the budget owner finds out three weeks later on the invoice.

Result: cost surprises that feel like infrastructure failures.

3. Audit Trail Gaps

When something goes wrong and an agent made an unauthorized or erroneous payment, reconstructing what happened is extremely difficult. API logs exist in silos across different vendors. The agent’s decision context is separate from the transaction record. Compliance teams cannot establish a clear chain of custody.

Result: regulatory exposure that increases as agent autonomy increases.

What Real-Time Payment Governance Looks Like

The solution is not more dashboards. It is moving payment authorization infrastructure outside the agent layer entirely.

When an agent’s payment credentials are scoped at issuance, the governance problem changes shape. Instead of monitoring what agents are spending after the fact, you define what they are allowed to spend before execution begins.

Here is what that looks like in practice with rosud-pay:

// Issue a scoped payment credential for an agent
const credential = await rosud.credentials.create({
  agentId: "procurement-agent-prod",
  maxAmount: 500,
  dailyLimit: 2000,
  allowedDomains: [
    "api.openai.com",
    "api.anthropic.com",
    "data.clearbit.com"
  ],
  requireApproval: {
    above: 200
  },
  expiresIn: "7d"
});
// Any attempt to pay outside the defined scope is rejected at infrastructure level

The credential itself encodes governance. There is no separate monitoring system to build. The constraint is enforced at the infrastructure level, not the application level.

This matters because of a core security principle: if your agent generates the payment authorization logic, it could also manipulate that logic. Governance must live in a layer the agent cannot modify.

Closing the Audit Trail Gap

Real-time enforcement is one half of the problem. Auditability is the other.

rosud-pay records every payment event with the agent identity, the credential scope, the transaction context, and a timestamp. This means that when compliance asks what happened, you have a structured record that maps AI decisions to financial outcomes.

// Query the spend audit trail for a specific agent
const auditLog = await rosud.payments.history({
  agentId: "procurement-agent-prod",
  from: "2026-04-01",
  to: "2026-04-25",
  format: "structured"
});
// Returns: totalSpend, currency, per-transaction records
// Each record maps: agentDecision -> vendor -> amount -> timestamp
// No manual reconciliation required

This is the governance infrastructure that enterprise AI deployments are missing. Not a policy document. Not a vendor audit. A real-time, scoped, auditable payment layer that operates at the infrastructure level.

The 72% Problem Is Actually a Measurement Problem

The VentureBeat survey did not find that enterprises are reckless. It found that enterprises are measuring the wrong things. They count model calls. They track prompt costs. They monitor data access.

They are not measuring the financial actions their agents are taking autonomously.

As agent capabilities expand and autonomous spending becomes normalized, the governance frameworks that enterprises are building today will have systematic gaps where payment flows are concerned. The organizations that close that gap now will have a significant advantage when regulators begin requiring it.

rosud-pay is the infrastructure layer that makes agent spending visible, constrained, and auditable. You can learn more at https://www.rosud.com/rosud-pay.

Key Takeaways

  • 72% of enterprises believe they control their AI, but few have visibility into what agents are spending
  • Shadow AI created shadow spending: 60% of enterprise builders created tools without IT oversight
  • Real payment governance requires scoped credentials enforced at the infrastructure level
  • Audit trails must map AI decisions to financial outcomes, not just API call logs
  • rosud-pay provides the spending governance layer that enterprise AI deployments are missing

Turning AI Coding Assistants into Engineering Mentors with Modular Skills

I’ve been experimenting with a problem I keep noticing while using AI coding assistants for learning.

Most coding agents are optimized for solving tasks quickly:
prompt → code dump → copy-paste → done.

That works for productivity.

But when learning from GitHub repositories, technical documentation, or complex codebases, this workflow often creates shallow understanding. The developer finishes the task without actually understanding the architecture, debugging process, or reasoning behind the implementation.

So I started building something around that idea.

🔗 https://github.com/yugash007/edu-agent-skills

edu-agent-skills is an open-source modular skill system for AI coding agents like Gemini CLI, Claude Code, Cursor, and others.

Instead of treating coding assistants as static chat interfaces, the project injects specialized behavioral skills into the workflow.

Current skills include:

🧠 Socratic mentoring
🔍 Misconception detection
🏗️ Architecture review
📦 Project critique
🐞 Debugging guidance
📚 Active learning workflows
📈 Weak-area tracking

The main use case right now is learning from:

  • GitHub repositories
  • markdown-based tutorials
  • OSS documentation
  • implementation-heavy engineering resources

For example, instead of immediately generating the final implementation, the agent can:

  • guide debugging step-by-step
  • ask targeted reasoning questions
  • detect flawed mental models
  • force active recall
  • review architectural decisions
  • adapt explanations based on repeated mistakes

The goal is not to replace developers with AI.

The goal is to make AI-assisted engineering workflows more educational, interactive, and reasoning-driven.

🛠️ Installation is simple:

npx edu-agent-skills install

The installer auto-detects supported local agents and configures the skills automatically.

Right now I’m actively exploring:
⚡ Skill composition
⚡ Agent behavior orchestration
⚡ Repository-aware learning workflows
⚡ Adaptive educational feedback
⚡ Modular agent capability injection

One thing I’ve realized while building this:
GitHub repositories are increasingly becoming the “new textbooks” for software engineering.

But reading repositories passively rarely builds deep understanding.

I think AI agents can help bridge that gap — if they are optimized for learning instead of only code generation.

Would genuinely like feedback from developers working with:

  • AI coding agents
  • OSS tooling
  • educational workflows
  • developer productivity systems

Open to contributors, ideas, and criticism.

From Blender Demos to Agent Toolchains: Why Terminal Skills Matter

Most AI + Blender demos still follow the same pattern:

Ask the model for a prompt.
Generate a scene or script.
Hope the result looks close enough.
Try again when it breaks.

That can be useful for experiments.

But it is not how real creative work usually gets done.

Blender is not just an image generator. It is a full production environment with scenes, objects, cameras, lights, materials, modifiers, animation timelines, render settings, exporters, and a Python API.

So the interesting question is not:

Can an AI agent describe a Blender workflow?

The better question is:

Can an AI agent actually operate Blender as part of a repeatable toolchain?

That is where terminal-native skills become interesting.

The gap between “knowing Blender” and using Blender

Modern AI models can explain Blender concepts very well.

They can tell you what a bevel modifier does.
They can describe three-point lighting.
They can write a Python script that creates a simple scene.
They can explain camera focal lengths, materials, render engines, and file exports.

But knowing the tool is not the same as reliably using the tool.

If you ask an agent to create a product render in Blender, a lot can go wrong:

  • the camera may not frame the object
  • the lights may be too weak or too harsh
  • the material names may be inconsistent
  • the render settings may be missing
  • the script may assume the wrong scene state
  • the output file may never be verified
  • the workflow may work once and fail tomorrow

That is the difference between a demo and a production workflow.

A demo can be impressive once.

A workflow needs to be repeatable.

Why Blender is a good test case for AI agents

Blender is creative, but it is also deeply scriptable.

That makes it a useful benchmark for agent workflows.

It is not enough for the agent to say something plausible. At the end, there should be an actual artifact:

  • a .blend file
  • a rendered image
  • an animation preview
  • an exported asset
  • a contact sheet
  • a set of named cameras
  • a reusable scene setup

Either the output exists or it does not.

That makes Blender less forgiving than a text-only task, and that is exactly why it is valuable.

It forces the agent to move from language into execution.

The role of Terminal Skills

Terminal Skills is an open-source catalog of skills for AI agents.

The idea is simple:

Agents do not just need more prompts. They need reusable operational workflows.

A skill can teach an agent how to perform a specific type of work:

  • when to use the workflow
  • what inputs are expected
  • which commands or scripts matter
  • what conventions to follow
  • how to verify the result
  • what failure modes to avoid
  • what output should be returned

That is different from just giving the agent a tool.

A tool gives the agent capability.

A skill gives the agent a path.

For Blender, that path matters a lot.

From GUI work to agent-operable workflows

Blender has a powerful GUI, and artists should absolutely use it.

But a GUI is not always the best interface for an AI agent.

Agents work best when they can:

  • run a command
  • inspect files
  • read logs
  • modify scripts
  • verify outputs
  • repeat the process

That is why terminal-native workflows are such a natural fit.

A terminal workflow gives the agent a clean feedback loop:

intent → command/script → output → verification → next step

Instead of guessing inside a visual interface, the agent can perform concrete operations and check whether they worked.

For example, a Blender skill might help an agent:

  • create a clean scene setup
  • generate camera variants
  • apply consistent material conventions
  • create lighting presets
  • render previews
  • export assets
  • validate that the output file exists
  • return a short summary of what changed

The human still controls taste and direction.

The agent handles the repeatable production layer.

What belongs inside a Blender skill

A useful Blender skill is not just a prompt template.

It should behave more like a small operating manual for the agent.

It should define:

  • what the workflow is for
  • what inputs are required
  • which files the agent may create or modify
  • which commands or scripts should be run
  • what naming conventions to follow
  • what output artifacts must exist
  • how to verify those artifacts
  • what common failure modes to check before reporting success

For example, instead of giving the agent a vague request like this:

Make a Blender product scene.

A skill can define a stronger contract:

Create or update the scene.
Save the .blend file.
Render a preview.
Confirm the preview file exists.
Return the paths and a short summary of what changed.

That contract is the important part.

It gives the agent a definition of done that is stronger than “the response sounds plausible.”

The skill is the interface

A lot of agent tooling conversations focus on connectors.

Can the agent access this app?
Can it call this API?
Can it run this command?
Can it control this environment?

Those questions matter.

But access is not the whole workflow.

If an agent can run Blender from the terminal, that is useful. But the more important layer is the operating pattern around that access:

  • what should the agent do first?
  • what should it avoid touching?
  • how should files be named?
  • when should it render a preview?
  • what should it check before saying done?
  • what should it hand back to the human?

That is why I like thinking about skills as interfaces for work.

They make the task boundary explicit.

The agent is not just dropped into a powerful tool and told to figure it out.

It gets a workflow it can execute, inspect, and repeat.

A better definition of done

For many AI tasks, “done” is too fuzzy.

The model stops writing, so the interaction feels complete.

But production work needs a stronger definition.

For a Blender workflow, “done” might mean:

  • the .blend file was saved
  • the preview render exists
  • the output path was returned
  • the scene contains named cameras and lights
  • the agent reports what changed
  • the human has something concrete to review

This is where terminal-native skills become especially useful.

They can push the agent toward evidence-based completion.

Not just:

Here is a script you could run.

But:

I ran the workflow, created these artifacts, checked these outputs, and here is what needs review.

That difference is small in a demo.

It is huge in real work.

Why this matters for reproducibility

One-off AI outputs can be impressive, but they are hard to build on.

If the process is hidden inside a long prompt and a lucky generation, it is difficult to answer basic questions:

  • Can we run this again next week?
  • Can another agent follow the same process?
  • Can we change one input and keep the rest consistent?
  • Can we debug why the output failed?
  • Can we tell which step created which artifact?

Terminal-native workflows are not glamorous, but they help with all of that.

Commands can be rerun.
Files can be inspected.
Logs can be read.
Outputs can be checked.
Conventions can be documented.

A skill wraps those pieces into something the agent can reuse.

That is the real value.

Not magic.

Repeatability.

Why this matters beyond Blender

Blender is just one example.

The same pattern applies to many agent workflows:

  • video processing
  • data cleanup
  • documentation updates
  • screenshot generation
  • test automation
  • asset exports
  • report generation
  • deployment checks

In each case, the problem is not only whether the model understands the task.

The problem is whether the agent has a reliable way to perform the task.

That usually requires more than a prompt.

It requires operational knowledge:

  • steps
  • defaults
  • constraints
  • checks
  • outputs
  • failure handling

That is what skills are good at packaging.

Skills make agent work more auditable

One underrated benefit of terminal-native skills is auditability.

When an agent uses a repeatable workflow, it can leave evidence:

  • which files were created
  • which commands were run
  • which checks passed
  • where the output was saved
  • what still needs human review

That makes agent work easier to trust.

Not because the agent becomes magically perfect.

Because the workflow becomes visible.

For creative work, that matters.

A human should not have to guess whether the agent actually rendered the scene, exported the asset, or just stopped after writing a script.

The output should be inspectable.

The practical takeaway

If you are building with AI agents, do not only ask:

What tools can my agent access?

Ask:

What repeatable workflows can my agent follow?

Blender makes this obvious because the final result is concrete.

A good agent workflow should not end with “here is some code you could run.”

It should end with an artifact, a check, and a clear next step.

That is the shift Terminal Skills is designed around:

  • less one-off prompting
  • more reusable workflows
  • less hidden improvisation
  • more executable, verifiable work

Agents do not need to become artists.

But they can become much better production assistants.

And for tools like Blender, that is already a very useful place to start.

The bigger point

Blender is useful here because it makes the gap visible.

If the render file does not exist, the workflow failed.
If the camera misses the object, the workflow failed.
If the agent cannot explain what changed, the workflow is hard to trust.

That same lesson applies to other agent work too.

Terminal Skills is about turning repeatable work into reusable operational knowledge: not just what the agent should know, but how it should act, check itself, and report the result.

If you want to explore the catalog, Terminal Skills is open-source and available at terminalskills.io.

AI assistance was used while drafting this article. The final structure, edits, and publishing decisions are human-reviewed.