Agents executing real-world actions create new security risks, including secrets leaking into prompts, overly broad access scopes, and loss of visibility into agent actions
Without strong monitoring, it's hard to trace actions and respond to incidents
Excessive agency (per OASP) is a key risk: agents receive too much access without guardrails
Risks include unsupervised API access, credential misuse, and sensitive data exposure if not properly controlled
Identity is crucial to attribute agent actions to specific users and enable proper control and auditing
Without clear user association, agents often run as generic service accounts, leading to the confused deputy problem
Solution: use open standards like OAuth 2.1, RAR, and token exchange to tightly control agent actions, preserve user identity, and refresh tokens securely
MCP servers move agent execution from local to distributed systems, increasing security needs
Use OAuth 2.1 flows where user signs in via browser, MCP server handles token minting, and agent receives user-scoped tokens without storing credentials