There’s no shortage of horror stories about AI agents deleting family photos, wiping databases, or deleting the entire code base. But to do the things they promise to do, AI agents need access to sensitive accounts, file systems, databases, and code repositories. How can developers create the right balance of access and control that allows agents to be useful without allowing them to cause disaster when they go off the rails? Chris Sev talks auth for AI agents, the core primitives that will enable developers to build systems that safely incorporate agents, and how we get from the chaos that early adopters are dealing with now to something that a mature company can actually run in production.
There’s no shortage of horror stories about AI agents deleting family photos, wiping databases, or deleting the entire code base. But to do the things they promise to do, AI agents need access to sensitive accounts, file systems, databases, and code repositories.
How can developers create the right balance of access and control that allows agents to be useful without allowing them to cause disaster when they go off the rails?
Chris Sev talks auth for AI agents, the core primitives that will enable developers to build systems that safely incorporate agents, and how we get from the chaos that early adopters are dealing with now to something that a mature company can actually run in production.