Why AI Agent Security Needs a New Control Model
As multi-agent applications become the default pattern for AI-powered software, traditional access control breaks down. Most teams still wire autonomous agents using shared API keys, inherited credentials, or persistent tokens that grant broad, standing privileges. This creates a dangerous trade-off: give agents wide access and they become ungovernable, lock them down and they lose their usefulness. The structural issue is that existing identity and access systems were designed for humans and long-lived services, not for agent-to-agent delegation or dynamic task-based permissions. In this landscape, a single misconfigured agent can delete data, exfiltrate secrets, or spin up costly infrastructure without a human ever touching the console. To safely achieve production deployment safety for AI-native systems, teams need autonomous agent access control that is granular, attributable, and ephemeral—scoped to each task instead of the entire environment.
Scoped Access and Delegated Sessions with Keycard
Keycard for Multi-Agent Apps introduces a session-based model that gives every agent its own verifiable identity without long-lived API keys or credentials on disk. When an agent starts, it receives identity through runtime attestation, and every task is wrapped in a session that binds actions to the originating user or upstream agent. Access is enforced via OAuth 2.0 Token Exchange, issuing scoped access tokens that narrow permissions at each hop in a workflow. This enables patterns such as agents acting on their own behalf, acting on behalf of humans, or even impersonating other agents under strict policy, all using the same SDK and control plane. The result is AI agent security by design: no agent holds more privilege than necessary, and every token is traceable, revocable, and tied to a specific session. For developers, this means they can ship multi-agent applications quickly without manually becoming identity experts.
Cloudflare–Stripe: Autonomous Deployment with Built-In Identity and Payment Guardrails
Cloudflare and Stripe have created a protocol that lets AI agents handle the entire deployment pipeline: creating cloud accounts, starting paid subscriptions, registering domains, and deploying applications to production. The workflow is driven by three components. Discovery exposes a catalog of services over a JSON-based API so agents can choose what to provision from the user’s intent. Authorization uses Stripe as an identity provider, triggering an OAuth flow when a Stripe email matches an existing Cloudflare account, or automatically creating an account when none exists. Payment relies on Stripe’s tokenization, keeping raw card details away from agents and enforcing a default spend cap of USD 100 (approx. RM460) per month per provider. Human gates remain at key legal and financial points—authentication, terms-of-service acceptance, billing setup, and merge decisions—while everything purely technical, from API token creation to DNS and SSL configuration, is automated by the agent.

Granular Permissions, Attribution, and Scoped Access Tokens in Production
Combining Keycard’s delegated sessions with the Cloudflare–Stripe protocol gives developers a practical path to secure, autonomous production deployment. Keycard’s scoped access tokens ensure that each agent receives only the permissions required for a specific task—such as provisioning a domain or updating a deployment—rather than broad account-wide capabilities. Every action can be attributed back through a chain of delegation, from human initiator to each downstream agent, giving security teams a complete audit trail. On the cloud side, identity and payment verification via Stripe provide a hard boundary for financial and legal consequences. This integration of identity, payment, and scoped access helps mitigate real failure modes like agents buying the wrong domain or looping on metered APIs. Developers can grant granular permissions to AI agents, keep autonomous agent access control aligned with organizational policy, and still let agents operate fast enough to be useful in production workflows.
