Allow
Local suggestions, read-only inspection, test generation without write authority, and low-risk comments where credentials and targets are narrow.
Independent research and operating notes on AI Software Delivery Control.
Reference / Security review
If engineering is ready to roll out coding agents and security is nervous, do not start with a generic AI policy debate. Start by mapping what the first workflows can touch, which credentials they inherit, which tools they can call, which actions need approval, and what proof remains after execution.
The goal is a narrow, useful first review: enough control to approve a sane rollout, without turning every prompt or local suggestion into a security meeting.
Last updated: May 6, 2026
The first security review for coding agents should focus on action authority. Identify the agent or workflow, owner, repo, credential, reachable actions, target systems, approval rule, and proof. Low-risk suggestion and read-only paths can stay lightweight. Write, CI/CD, MCP/tool, secret access, package publish, deploy, and production-adjacent paths need explicit controls.
A practical rollout review should not try to govern every AI use case at once. Pick the first workflows that can affect delivery. A coding assistant that suggests code locally is a different review problem than an agent or automation that can open pull requests, modify workflow files, invoke MCP tools, use tokens, run CI/CD, publish packages, or trigger release paths.
The review should produce a decision the organization can defend: what is allowed now, what requires approval, what is blocked, what evidence must exist, and what would trigger re-review.
Start with one or two workflows and write the action path down. The first Agent Action BOM does not need a platform. It needs enough structure for AppSec, platform, and engineering to discuss the same object.
Workflow: AI-assisted PR repair
Owner: Platform engineering
Repo/path: customer-api/.github/workflows/pr-repair.yml
Credential: repo-scoped CI token
Reachable actions: write branch, run tests, comment on PR
Tool reach: issue tracker comment; no production data access
Approval-required: workflow-file changes, package publish, deploy
Blocked: production secrets, delete branch, bypass required checks
Proof: PR link, workflow run, credential identity, policy verdict, approver, validation result
A good first posture keeps adoption practical. It does not approve the entire category and it does not block every interaction.
Local suggestions, read-only inspection, test generation without write authority, and low-risk comments where credentials and targets are narrow.
Workflow-file changes, branch writes from unattended jobs, package publish, deploy, secret access, MCP write actions, and production-adjacent actions.
Bypassing required checks, accessing production secrets without an approved path, destructive actions without recovery, or actions without a durable proof trail.
The first rollout should define proof before the first incident or audit request. A reviewer should be able to reconstruct the actor, owner, credential, action, target, approval, validation, and outcome.