Identity
Token, service account, OAuth grant, deploy key, CI secret, cloud role, or inherited platform identity.
Independent research and operating notes on AI Software Delivery Control.
Reference / Credential risk
If an AI-assisted workflow can act with a standing token, service account, OAuth grant, or inherited CI secret, the practical question is not whether the model is safe. It is whether the credential is broader or longer-lived than the task requires.
AI agent workflows make credential design more important because they can turn a credential that was once used occasionally by a person or scheduled job into repeatable action authority across code, tools, CI/CD, packages, infrastructure, or release paths.
Last updated: May 6, 2026
Long-lived credentials are risky in AI agent workflows when they give more authority, more reach, or more time than the workflow needs. The safer pattern is to map every credential to the action path it enables and then reduce scope by repo, branch, task, owner, environment, and time wherever possible.
Credentials are where AI-assisted engineering stops being only a suggestion layer. A workflow with a credential can read private data, write branches, comment on pull requests, update issues, publish packages, call cloud APIs, deploy, or touch production-adjacent systems depending on the surrounding environment.
The model does not need to be malicious for credential risk to matter. A workflow can be mis-scoped, invoked in the wrong context, reused by another team, changed by a later PR, or expanded through a shared template. Standing credentials make those mistakes more durable.
Start with the credentials attached to action paths, not with a generic secret inventory. The relevant unit is:
agent/workflow -> credential -> action -> target -> owner -> approval/proof
Token, service account, OAuth grant, deploy key, CI secret, cloud role, or inherited platform identity.
Repo, branch, organization, project, environment, package registry, cloud account, database, or external service.
Read, write, execute, publish, deploy, delete, approve, secret access, cloud API, or production-adjacent action.
Standing, manually rotated, automatically rotated, short-lived, just-in-time, or tied to a single run.
The goal is not to remove every credential from every workflow. The goal is to make credential authority match the action path.
Approval should sit where credential use can change state or expand authority, not at every model interaction.
Credential proof should answer who or what used the credential, for which action, against which target, under which approval rule, and with what outcome.
Workflow: AI-assisted dependency update
Credential: repo-scoped CI token
Owner: Platform engineering
Action: write branch and open PR
Approval rule: allowed for branch write; approval-required for workflow-file change
Target: customer-api repo
Proof: workflow run, credential identity, PR link, policy verdict, approver if required, validation result
A log line that says a job ran is useful, but it is not enough by itself. The proof trail should connect the credential to the action path so a reviewer can distinguish allowed automation from unintended authority.