The Problem: God Mode by Default
Modern AI agents operate with unrestricted access to powerful tools. When you grant an LLM access to your GitHub account, database, or cloud infrastructure, you’re not just giving it an API key—you’re granting unbounded intent execution with no policy layer.The Threat Model
AI agents face unique security challenges that traditional systems were not designed to handle:| Threat | Description | Real-World Example |
|---|---|---|
| Indirect Prompt Injection | Malicious instructions embedded in data the agent processes | GeminiJack (2024): Attackers embedded prompts in Google Docs that hijacked Gemini’s actions |
| Consent Fatigue | Users approve broad permissions without understanding scope | ”Allow GitHub access” grants repo:delete, not just repo:read |
| Shadow AI | Agents operating outside enterprise security boundaries | Developers running local Copilot instances with production credentials |
| Privilege Escalation | Agents accumulating permissions across tool calls | Agent chains: Slack → Calendar → Email → sends unauthorized messages |
| Data Exfiltration | Sensitive data leaving through unmonitored egress | Agent “summarizing” code by posting to external APIs |
API Keys Are for Code. AIP Is for Intent.
Traditional security assumes deterministic code execution. API keys authenticate the application. But LLMs are non-deterministic systems executing user intent through model interpretation.Security Comparison
AIP vs Standard MCP
| Aspect | Standard MCP | AIP-Enabled MCP | |--------|--------------|-----------------|| | Authentication | Static API keys | Short-lived AAT tokens (future) | | Authorization | None (full access) | Per-action policy check | | Scope | Implicit (whatever key allows) | Explicit policy declaration | | Audit | Application logs (if any) | Immutable, structured audit trail | | Egress Control | None | DLP scanning + policy rules | | Revocation | Rotate API keys | Instant session revocation | | Human-in-the-Loop | Not supported | Configurable approval gates | | Blast Radius | Unlimited | Scoped to policy | | Compliance | Manual attestation | Policy-as-code, auditable |Feature Comparison Table
| Feature | Standard MCP | API Keys | AIP |
|---|---|---|---|
| Agent Identity | ⚠️ None | ⚠️ User-level only | ✅ Per-agent cryptographic identity |
| Prompt Injection | ⚠️ Vulnerable | ⚠️ Vulnerable | ✅ Policy blocks unauthorized intent |
| Authorization Granularity | ⚠️ All-or-nothing | ⚠️ Scope-level | ✅ Per-tool, per-argument validation |
| Audit Trail | ⚠️ None | ⚠️ Grant-time only | ✅ Immutable JSONL per action |
| Human-in-the-Loop | ⚠️ Not supported | ⚠️ Not supported | ✅ Native OS approval dialogs |
| Revocation | ⚠️ Rotate keys | ⚠️ Rotate keys | ✅ Registry revocation list |
| Data Exfiltration | ⚠️ Unrestricted | ⚠️ Unrestricted | ✅ DLP scanning + egress filtering |
| Compliance | ⚠️ Manual | ⚠️ Partial | ✅ SOC 2, GDPR, HIPAA, SOX ready |
Why Not Just Use…?
OAuth Scopes?
OAuth Scopes?
OAuth scopes are:
- Coarse-grained: “repo access” vs “read pull requests from org X”
- Static: Granted at install time, can’t change per-session
- User-facing: Leads to consent fatigue
- Fine-grained: Per-tool, per-argument validation
- Dynamic: Can change without re-authentication
- Developer-controlled: Defined in config files, version-controlled
Service Mesh (Istio)?
Service Mesh (Istio)?
Service meshes operate at the service level, not the action level. They can say “Service A can call Service B” but not “Agent can only call
repos.get with org:mycompany/*”.AIP operates at the tool call level within a service.Container Sandboxing?
Container Sandboxing?
Containers provide process isolation but not semantic authorization. A containerized agent with network access can still exfiltrate data.AIP provides policy-based authorization that understands what the agent is trying to do.
Workforce AI Governance (e.g., SurePath.ai)?
Workforce AI Governance (e.g., SurePath.ai)?
Workforce AI governance tools solve different problems at different layers:
These are complementary: Use workforce governance to monitor employee AI usage. Use AIP to secure the agents those employees build.
| Aspect | Workforce AI Governance | AIP |
|---|---|---|
| Focus | Employee AI usage monitoring | Agent action authorization |
| Layer | Network/application level | Tool-call level |
| Question | ”Who in my org is using AI?" | "What can my AI agents do?” |
| Deployment | Typically SaaS | Open protocol, self-hosted |
| Use Case | Audit employee ChatGPT usage | Block agent from deleting databases |
Comparison: AIP vs Other Approaches
| Approach | Authentication | Authorization | Audit | Revocation |
|---|---|---|---|---|
| Raw API Keys | Static token | None | App logs | Rotate everywhere |
| OAuth Scopes | Token-based | Coarse-grained | Varies | Token expiry |
| Service Mesh (Istio) | mTLS | Service-level | Yes | Certificate rotation |
| AIP | Short-lived AAT (future) | Per-action policy | Immutable trail | Instant session kill |
AIP is purpose-built for the unique challenge of non-deterministic AI agents executing user intent.
Architecture Principles
AIP is designed around six core security principles:Real-World Attack Scenarios
Scenario 1: Prompt Injection via Poisoned Document
Without AIP:Scenario 2: Consent Fatigue Leading to Over-Privileged Access
Without AIP:Scenario 3: Shadow AI with Production Credentials
Without AIP:Prior Art & Inspiration
AIP builds on established security patterns:- SPIFFE/SPIRE: Workload identity framework — AIP extends this to agent identity
- Open Policy Agent: Policy-as-code — AIP’s policy engine draws from OPA’s design
- Istio: Service mesh authorization — AIP applies mesh principles to agent traffic
- AWS IAM: Fine-grained permissions — AIP manifests are IAM policies for agents
- OAuth 2.0 / OIDC: Token-based identity — AIP leverages OIDC for federation (future)
The Bottom Line
Stop Trusting Your Agents. Start Verifying Them.
Traditional security tools were built for deterministic code, not non-deterministic AI agents. AIP provides the missing security primitive: runtime policy enforcement at the tool-call layer.
Next Steps
Try the Quickstart
See AIP block a dangerous operation in under 5 minutes
Read the Spec
Formal protocol definition and conformance requirements
Write Your First Policy
Complete YAML schema and examples
Explore the Architecture
Deep dive into the two-layer design