The CAP Theorem for Agents
Blog post from Oso
The deployment of coding agents in organizations is hindered by a tradeoff similar to Brewer's CAP theorem, where teams must choose between capability, autonomy, and permissions, often resulting in compromised security. Unlike the inherent limitations of distributed systems, this tradeoff is an infrastructure issue that can be addressed by implementing automated least privilege frameworks. Traditional permissions systems, designed for human users, fail to adequately secure non-human agents that operate at machine speed and are susceptible to trickery. Overpermissioning remains a critical vulnerability, with many organizations still applying human-centric access controls to AI agents, which exponentially increases risk. To mitigate these risks, organizations must shift to real-time, dynamic permission management and continuous monitoring to ensure that agents only access what is necessary for their tasks, thereby reducing the potential for breaches. The advancement of AI provides the tools needed to continuously analyze and adjust permissions, making it possible to resolve the tradeoff and securely deploy agents. As models improve and the demand for agent deployment grows, addressing the permissions problem becomes increasingly urgent for organizations to avoid security incidents and leverage the full potential of AI agents.