Sprawl Series / Post 3 of 4 / Platform

Declared Agents Are Not Deployed Agents

A recurring platform mistake is treating declarations as operational truth. Repos mention agents early because experimentation is cheap. Runtime-ready, bounded, supportable agents arrive much later. The sprawl data makes that gap explicit, and that is useful because platform contracts are built on what can run, not on what a repo references.

Declaration is cheap. Deployment is the governed part.

Grounding

Run ID: sprawl-v2-full-20260312b
Declared-agent prevalence: 98.2%
Deployed-agent prevalence: 4.04%
Binding-complete agents: 0
Core artifact: runs/tool-sprawl/sprawl-v2-full-20260312b/agg/campaign-summary-v2.json

The declaration trap

Platform leaders are now surrounded by repos that mention agent frameworks, orchestration libraries, MCP patterns, or agent-specific configuration. Those signals matter. They show where teams are experimenting and where future delivery surface may emerge. But they are not the same thing as deployed, bound, and governable runtime actors.

The report makes that distinction measurable. Almost every completed target declared agents. Only a small minority showed deployable-agent signals. None of the detected agents were binding-complete. The public repo surface is therefore rich in declarations and thin on operational completeness.

The mistake many organizations make is collapsing all of those states into one idea called "agent adoption." That turns a useful platform question into an ambiguous governance label. The better move is to preserve the lifecycle stages.

A better platform lifecycle for agents

A practical model is to separate at least five states: declared, bound, runnable, privileged, and production-supported. The report shows plenty of the first state and little evidence for the later ones. That is not a moral failure. It is a lifecycle signal.

Declared means the repo references an agent framework or configuration. Bound means the repo exposes the tool, identity, and data contracts that make the agent legible. Runnable means the path appears complete enough to operate. Privileged means it can write, execute, or access higher-risk surfaces. Production-supported means the organization is willing to stand behind it operationally.

Why this matters for platform contracts

Platform work depends on precise contracts. A platform team needs to know what the agent can call, what identity it will use, what data scope it can see, and where approval and evidence handoffs live. A declaration-only agent tells you that adoption pressure exists. It does not tell you that the runtime boundary is ready.

That is why the report is useful for platform leadership. It gives a way to separate exploration from operational readiness. Without that separation, organizations end up governing "agents" as a vague category instead of governing concrete execution paths.

The platform contract is where AppSec and developer experience meet. If platform can standardize identity, invocation surfaces, approval handoffs, and event logging, security stops inheriting a new one-off control problem every time a repo declares an agent.

What mature platform teams should do with this signal

The right response is not to ban declarations. It is to make the step from declaration to deployment explicit and reviewable.

Platform discipline is what keeps agent enthusiasm from becoming a diffuse and unreviewable delivery surface.

Management implication: this is primarily an operating-model decision, not a framework-selection decision.

The platform lesson

The report is not warning that every repo with agents is already dangerous. It is showing how quickly declaration can outrun the underlying contracts that make deployment governable. That is exactly where platform teams should intervene.

If a platform organization can define the path from declaration to deployment clearly, AppSec and leadership get a much better dataset to govern. If it cannot, every later control layer inherits ambiguity.

Platform maturity is not measured by how many agent frameworks teams can import. It is measured by how legibly the organization promotes an experiment into a governed execution path.