Back to Infrastructure
infrastructureL1 Ad-hocAgent Runtime & Sandboxing

Agent has access to everything or nothing

At the L1 maturity level, organizations face a binary permission model for AI agents: either the agent has full access to the developer's environment (everything), or access is so

  • ·Agents run inside the developer's local IDE (no separate runtime)
  • ·No isolation between agent execution and developer's local environment
  • ·Developers are aware of the security implications of agents with full local access
  • ·Agent access scope (file system, network) is understood even if not restricted

Evidence

  • ·Agent runs as IDE plugin with no containerization or isolation
  • ·No sandboxing configuration exists

What It Is

At the L1 maturity level, organizations face a binary permission model for AI agents: either the agent has full access to the developer's environment (everything), or access is so restricted that the agent cannot do useful work (nothing). There is no middle ground. This binary state is not a design decision - it emerges from the absence of any access control infrastructure. Without the ability to define scoped permissions, teams default to one of two extremes.

The "everything" side of the binary is the more common path. Teams give agents full access because it is the path that makes agents useful immediately. The agent can read any file, run any command, use any installed CLI tool. This maximizes what agents can do today while deferring the security question indefinitely.

The "nothing" side is what happens when security concerns override productivity concerns. The agent is locked down so tightly - no file access beyond the current file, no terminal execution, no external integrations - that it becomes a sophisticated autocomplete tool rather than an autonomous agent. Teams that end up here are often reacting to a security policy rather than engineering a thoughtful permission model.

The fundamental problem with the binary model is that both extremes are wrong. "Everything" creates unacceptable security risk as agents become more capable. "Nothing" forfeits the productivity gains that justify the AI investment. The path out of this binary is granular, task-scoped permissions - which requires infrastructure investment that does not exist at L1. Recognizing this binary as a structural problem, not a temporary inconvenience, is the first step toward building the permission model that enables safe, high-autonomy agents.

Why It Matters

  • Binary access creates a permanent productivity ceiling - developers who recognize the security risks of "everything" self-limit agent autonomy, and developers who have only "nothing" cannot use agents for complex tasks at all
  • Security teams reject everything-or-nothing - when security reviews AI tooling and sees the binary model, the common outcome is restriction rather than enablement; fine-grained permissions are the negotiating lever that prevents blanket lockdowns
  • Incident blast radius is tied to access scope - an agent with scoped access to one repository can make mistakes within that scope; an agent with everything-access can make mistakes anywhere the developer has access
  • Compliance requirements assume least-privilege - SOC 2, ISO 27001, and most security frameworks require least-privilege access; the everything model is structurally incompatible with these requirements
  • The binary model blocks multi-agent architectures - when you want to run 5 parallel agents with different roles, you need different permission profiles for each; the everything-or-nothing model makes this impossible to manage safely

Getting Started

6 steps to get from here to the next level

Common Pitfalls

Mistakes teams actually make at this stage - and how to avoid them

How Different Roles See It

B
BobHead of Engineering

Bob's team is split: half are using agents with full environment access and are productive but exposed, the other half have been told by the security team to restrict agent access and are frustrated because restricted agents cannot do useful work. Bob is caught between the two groups and is not sure how to reconcile them.

What Bob should do - role-specific action plan

S
SarahProductivity Lead

Sarah has been trying to drive agent adoption but keeps hitting the same blocker: security policy restricts agent access to the point where agents cannot run tests, cannot read across modules, cannot access the APIs they need. Every time she tries to expand agent use cases, security flags the expanded access request. She feels stuck between productivity and compliance.

What Sarah should do - role-specific action plan

V
VictorStaff Engineer - AI Champion

Victor has been running agents with everything-access because it is the only way to do the complex multi-step tasks he uses agents for. He knows this is not right architecturally, and he has been thinking about what a better permission model would look like. He has sketched out a per-task credential system where each agent gets a unique set of scoped credentials generated at task creation time and revoked when the task completes.

What Victor should do - role-specific action plan

Agent Runtime & Sandboxing