Blog

AI Agent Security

Thoughts on identity, permissions, and accountability for autonomous AI systems.

Featured

Featured22 janvier 2026

What Is AI Agent Identity?

AI agent identity is the cryptographic proof that a specific agent initiated a specific action. Not a username. Not an API key. A verifiable, unforgeable binding between an agent instance and every action it takes.

8 min read
Read article
Featured15 janvier 2026

AI Agents Are the New Root Users

AI agents running in production have full access to your APIs, databases, and payment systems — with no identity, no permission boundary, and no audit trail. This is the root access problem of the AI era.

9 min read
Read article
Featured28 janvier 2025

The Missing Layer in AI Infrastructure

The AI infrastructure stack has compute, orchestration, memory, and observability. But there's one critical layer that's still missing: identity and permission control for autonomous agents.

6 min read
Read article
Featured20 janvier 2025

AI Agents Are the New Root Users

Your LLM agents have access to your production APIs, databases, and payment systems — with no identity, no permission boundary, and no audit trail. Here's why that's a crisis waiting to happen.

8 min read
Read article

All articles

12 février 2026

Why LLM Agents Need Cryptographic Identity

API keys identify deployments. Session tokens identify sessions. Neither identifies an LLM agent. Cryptographic identity — an Ed25519 keypair per agent — is the only mechanism that provides unforgeable, auditable proof of which agent did what.

10 min read
5 février 2026

How to Revoke an AI Agent in Production

Revoking a compromised or misbehaving AI agent should take seconds, not hours. Here's the architecture behind instant agent revocation — and why rotating API keys is not enough.

9 min read
29 janvier 2026

Agent Authorization vs Human IAM: Why They're Not the Same Problem

Auth0, Okta, and AWS IAM were built for humans who log in. AI agents don't log in — they spawn, act at machine speed, and terminate. The authorization model must be fundamentally different.

10 min read

Stay up to date

Get notified when we publish new articles on AI agent security and infrastructure.