Discussion about this post

User's avatar
Pawel Jozefiak's avatar

83.4% can't distinguish human from non-human identity behavior, and that number explains most of the breach surface you're describing. The agent isn't the weak point, the audit trail is. I run agents overnight against local tools and external APIs, and the logging I trust most is what I built myself: append-only JSONL files per session, chain IDs threaded through every tool call. Not because built-in tooling is bad but because I need to answer "what did it do at 3am" without hunting across five dashboards. The visibility paradox (89% claim OAuth governance, 27% got breached anyway) reads like the classic gap between policy docs and runtime behavior. Static configs don't catch machine-speed flows.

No posts

Ready for more?