Why Traditional IAM Fails for Agentic AI and How New Identity Frameworks Secure OpenClaw
The rapid rise of autonomous AI agents like OpenClaw exposes severe security gaps—over‑privileged access, unauthenticated public instances, and one‑click RCE—forcing a rethink of identity‑centric IAM designs that can protect agents through propagation, secretless auth, context awareness, and intent‑aware authorization.
Introduction
In early 2026, the OpenClaw autonomous‑agent framework spread virally, marking a shift from conversational AI to agentic AI. Users often grant OpenClaw "God Mode"—unrestricted file, code, and internet access—enabling risky use cases such as automated stock trading and online payments.
OpenClaw Security Incidents
System‑level risk from excessive permissions OpenClaw can execute shell commands, read/write files, and run scripts. Misconfigured skills or malicious injections allow it to bypass DLP and endpoint monitoring. Cisco demonstrated a malicious skill "What Would Elon Do?" that turned the agent into a covert data‑exfiltration channel. Koi Security identified 2,857 Skills, of which 341 were malicious, including disguised cryptocurrency tools that installed keyloggers and macOS stealer malware to steal wallets, browsers, and credentials.
Unauthenticated public instances Researcher @fmdz387 discovered nearly a thousand publicly accessible OpenClaw instances via Shodan, all lacking authentication. Jamieson O'Reilly extracted Anthropic API keys, Telegram bot tokens, Slack accounts, and months of chat logs, and could act as a system administrator.
One‑click remote code execution (CVE‑2026‑25253) DepthFirst researchers found that a crafted web page can trigger arbitrary code execution in a local OpenClaw instance, stealing stored API keys and tokens with minimal user interaction.
Core Argument: Identity Is the Only Defense
Agent behavior is driven by probabilistic LLM inference rather than deterministic code, making traditional network perimeters ineffective. Identity and Access Management (IAM) become the sole security boundary for autonomous agents.
Lethal Trifecta of Agent Risks
Access to Private Data Agents can read .env files, SSH private keys, credentials.json, and other sensitive configurations.
External Communication Agents routinely call external APIs, providing a legitimate channel to exfiltrate data.
Exposure to Untrusted Content Agents ingest web pages, emails, and user prompts, which may contain malicious payloads.
Why Traditional IAM Fails for Agents
Identity Propagation Agents act on behalf of users and may chain through sub‑agents, obscuring the original requestor and enabling confused‑deputy attacks, as demonstrated by CVE‑2026‑25253.
Static Permissions vs. Dynamic Context Human roles have fixed permissions, while agents require task‑based, rapidly changing privileges, expanding the attack surface.
Insufficient Granularity OAuth scopes are too broad (e.g., read/write email). Agent‑specific policies need fine‑grained constraints such as domain‑restricted reads and target‑specific writes.
Key Leakage With full filesystem and execution rights, agents can easily read and transmit secrets like .env or SSH keys.
Applying traditional IAM to these traits leads to the “grant‑everything‑once‑and‑it‑breaks” governance paradox.
Essential IAM Features for the Agent Era
Identity Propagation Ensure the original user context traverses the agent chain, preventing a single high‑privilege token from becoming a universal key.
Secretless Authentication Separate secret storage from usage; agents hold only opaque references while short‑lived dynamic credentials are injected by a gateway.
Context Awareness Validate runtime integrity and session attributes (e.g., trusted enclave, verified shopping‑cart state) before granting access.
Intent‑Aware Authorization Analyze prompts and execution logic to confirm that an agent’s actions align with the user’s original intent, blocking prompt‑injection or logic‑jailbreak attacks.
Market Solutions Deep Dive
3.1 AWS AgentCore Identity
Identity Propagation via token delegation.
Secretless auth using an outbound gateway and Token Vault.
Context awareness through session attributes and principal tags.
Intent‑aware authorization via the Evaluation module preview.
3.2 Microsoft Azure Entra Agent ID
Conditional Access provides strong context awareness (compliant container, internal IP, low threat score).
Workload Identity Federation enables cross‑cloud identity propagation.
Enhanced sign‑in logs deliver precise identity attribution.
3.3 Volcano Agent Identity (ByteDance)
Provides inbound authentication (user identity verification via internal SSO, Feishu, Google Identity) and outbound authentication (gateway‑mediated secretless access). Implements identity propagation, secretless auth, context awareness, and intent‑aware checks using a Cedar‑based policy engine.
The solution integrates with Volcano ArkClaw, AgentKit, Coze 2.0, and MCP Marketplace, covering high‑code, low‑code, and marketplace AI applications.
Conclusion
As autonomous agents become mainstream, traditional IAM models designed for static human users are inadequate. A new identity‑centric security stack—combining propagation, secretless authentication, context awareness, and intent verification—is essential to mitigate the lethal trifecta of agent risks. Leading cloud providers are already embedding these principles in their Agent IAM offerings.
ByteDance SE Lab
Official account of ByteDance SE Lab, sharing research and practical experience in software engineering. Our lab unites researchers and engineers from various domains to accelerate the fusion of software engineering and AI, driving technological progress in every phase of software development.
How this landed with the community
Was this worth your time?
0 Comments
Thoughtful readers leave field notes, pushback, and hard-won operational detail here.
