Discussion about this post

User's avatar
Pawel Jozefiak's avatar

The Rehberger disclosure is the example I keep coming back to. Converting a coding assistant into an exfiltration engine using its own credentials - not a hypothetical, that's a Tuesday.

Running an autonomous agent with broad system access taught me this the hard way. Started with long-lived API keys because it was easy. Then realized every key was a liability that never expired. Moved to scoped, short-lived tokens per task type and it immediately reduced the blast radius.

The ephemeral identity problem is real. My agent spawns sub-agents needing different access levels for seconds at a time. Traditional IAM wasn't built for 'exists for 30 seconds, needs write access to one file, then disappears.'

What worries me most: most people building agents right now aren't thinking about this at all.

2 more comments...

No posts

Ready for more?