Runlayer named to Rising in Cyber 2026 List by Morgan Stanley →
Alvaro Inckot
FGA is not enough for your agent authorization

FGA is not enough for your agent authorization

The WorkOS team released an article discussing agent authorization, presenting a fine-grained authorization (FGA) solution that’s effectively structured hierarchy atop traditional role-based access control (RBAC) methods. This approach is misguided.

We are aligned with WorkOS’s diagnosis of the problem. One of the biggest security issues facing AI is agent authorization. Standard RBAC falls flat for agents. However, hierarchy-based FGA just throws structures at the problem. It lacks the context awareness and rule evaluation needed to protect against modern day attack vectors.

Instead, a policy-based access control (PBAC) strategy is better. PBAC is bounded by rules, not hierarchies, an approach that better protects systems, agents, and data.

Why PBAC beats FGA for agent authorization

Runlayer’s PBAC strategy allows both agent accounts and users to own policies that define what actions they can perform. The PBAC algorithm follows a simple structure: (i) at least one allow with zero denies, (ii) default deny. For any given subject (user or agent), the engine fetches applicable policies, checks scope and principal match, evaluates conditions against full context, then applies “deny-overrides-allow”. If at least one allow policy activates and no deny activates, access is granted. If any deny policy activates, access is denied, regardless. If nothing matches, the algorithm denies by default.

PBAC outperforms other agent authorization flows in three critical ways.

1. PBAC is robust

PBAC policies evaluate against the full request context at runtime, including tool arguments, request metadata, subject attributes, network origin. Runlayer can express cross-cutting constraints that don't fit a resource hierarchy. For example: "this agent can query the database only when the table matches a pattern and the request originates from a corporate network."

In FGA, you'd need custom application logic for this. In PBAC, it's a declarative policy.

2. PBAC is simple and traceable

Runlayer’s evaluation engine is intentionally minimal. There's no role hierarchy to traverse, no graph to walk, or no inheritance chain to resolve. Instead, PBAC evaluation is flat: match policies, evaluate conditions, decide. The simplicity also makes it auditable (every decision can be traced to specific policy IDs logged in the audit trail) and predictable (no surprising inherited permissions from a parent node in a resource tree).

The complexity lives in what policies are written, not in how the engine resolves them.

3. PBAC exhibits Asymmetric Access Control

For on-behalf-of (OBO) agents, the engine evaluates agent policies and user policies independently in sequence. Both must allow for access to be granted. Accordingly, you can write policies that are asymmetric: stricter for delegated agents than for the user. Organizations can grant users broad access while surgically limiting what agents can do with that access.

FGA's intersection check treats both sides symmetrically: it can't express "users can, but agents acting as them can't."

Production-ready agent identities & token architecture

The WorkOS article positions agent identity as a new frontier with custom infrastructure being built by Microsoft, Okta, and IETF working groups.

Runlayer already implements unique agent identities using existing, interoperable standards. Each agent is treated as a first-class OAuth client with its own Client ID and Client Secret, allowing any OAuth-compatible client to participate in the delegation flow without proprietary SDKs. The agent token system is built on top of the following established OAuth RFCs:

  • RFC 8693 (Token Exchange): OBO tokens are obtained via standard urn:ietf:params:oauth:grant-type:token-exchange. The agent presents its M2M token as subject_token, the delegating user's identity as actor_token. The resulting JWT carries the RFC 8693 act claim ({"sub": agent_client_id, "act": {"sub": delegator_user_id}}) making the delegation chain machine-readable and standards-compliant.
  • RFC 7591 (Dynamic Client Registration): MCP clients can register dynamically.
  • RFC 8707 (Resource Indicators): Token requests include a resource parameter binding the token to a specific server.
  • RFC 7009 (Token Revocation): Standard revocation endpoint with idempotent behavior.

By using existing OAuth RFCs, Runlayer enables agents to exist as a distinct identity class with their own M2M credentials. Each agent has their own principal type in the policy engine, their own policies separate from users, and their own audit trail. Runlayer’s policy engine can establish dedicated evaluation paths for standalone agents vs agents acting on behalf of users.

Open questions in WorkOS’s approach

In WorkOS’s outlined solution, there remains a few unanswered questions around authorization logistics, end states, and application logic. In particular, the solution mentions PKCE. This opens a few questions:

  • When thousands of agents dynamically spawn sub-agents, can the FGA graph absorb the resulting write burst without becoming the bottleneck?
  • What happens after "access denied"? What is the agent shown and how is it guided towards resolution, if at all?
  • Where does enforcement actually happen?

The WorkOS post leaves these unanswered. However, what we do know is that WorkOS requires application logic to perform a simple two-step check against FGA. Every application consuming agent tool calls must integrate FGA, build the enforcement layer, handle errors, and log decisions.

Authorization alone is insufficient

Runlayer tackles a few other problems to actually secure AI applications. These problems establish why authorization is a necessary but insufficient layer for production agent deployments.

Credential Lifecycle Management

Authorization answers "is this allowed?" but not "how does the agent actually authenticate to the upstream server?" Session resolution, token refresh, expiry detection, re-authorization prompts, and transport abstraction (SSE, streaming HTTP, stdio) are all problems that exist between the authorization decision and the actual tool call.

Content-level security

An authorized tool call can still leak credentials in arguments, return PII in outputs, or contain hidden characters designed to manipulate the agent. Authorization controls if a call happens; it says nothing about what data flows through it. Runlayer scans inputs (credential masking, PII detection) and outputs (hidden character detection, context-aware content scanning) as a separate layer.

Supply chain security for tools

MCP servers are third-party code. A compromised server can inject prompt injection attacks or exfiltration instructions into tool descriptions. Authorization trusts the resource hierarchy is honest. Runlayer runs security scanning on tool definitions during discovery, flagging and blocking malicious metadata before the agent ever sees it.

Large output management

Tool outputs can be massive. Authorization doesn't address the data plane: what happens when a 5MB database dump flows through an authorized call and overflows the agent's context window? Runlayer detects oversized outputs, offloads them, and provides filtered retrieval.

Closing Thought: PBAC wins

PBAC gives you context-aware, auditable, asymmetric access control without the complexity of graph traversal. Agent authorization matters, but it's one layer of a production stack. Get the policy model right, then solve everything around it.

Mar 9, 2026
 • 
Alvaro Inckot
Read more
Runlayer and Anthropic MCP Tunnels: connecting Claude to systems behind your firewall

Runlayer and Anthropic MCP Tunnels: connecting Claude to systems behind your firewall

Runlayer and Anthropic collaborated on MCP Tunnels, which invert the connection direction so your network reaches out to Anthropic instead of exposing inbound ports, removing the security wall that blocks Claude from accessing internal systems like Jira, databases, and telemetry.
May 20, 2026
 • 
Andy Berman
Don’t build your own MCP gateway

Don’t build your own MCP gateway

Senior engineers look at an MCP gateway and see a reverse proxy with auth and logs. That instinct is wrong. MCP attack vectors shift constantly, performance breaks at scale in specific ways, and threat detection requires MCP-specific signals that generic tools miss.
May 18, 2026
 • 
Alex Frazer
Fine-Grained Permissions and Identity Management for AI Agents

Fine-Grained Permissions and Identity Management for AI Agents

MCP adoption has exploded inside enterprises, with shadow servers and over-provisioned agents creating an attack surface most security teams haven't caught up to. Traditional IAM, OAuth, and RBAC weren't built for non-deterministic agents that delegate to other agents.
May 18, 2026
 • 
Tal Peretz
Runlayer named to Rising in Cyber 2026

Runlayer named to Rising in Cyber 2026

Runlayer was named to Notable Capital & Morgan Stanley's 2026 Rising in Cyber list, voted on by 150 sitting CISOs. Andy Berman on why the recognition matters, and what it signals about how AI-native companies are getting built.
May 12, 2026
 • 
Andy Berman
Why production AI systems need MCP gateways

Why production AI systems need MCP gateways

An MCP gateway acts as the centralized proxy layer for agent-to-tool communications, handling tool discovery, authentication, input/output filtering, and observability across an organization's agentic systems.
May 11, 2026
 • 
Tal Peretz
The MCP STDIO RCE class, and why Runlayer doesn't run what the LLM asks it to

The MCP STDIO RCE class, and why Runlayer doesn't run what the LLM asks it to

OX Security found a design-level flaw in Anthropic's Model Context Protocol. MCP's STDIO transport turns a config file into a command executor. Here's how Runlayer's control plane breaks each of the four attack vectors.
Apr 22, 2026
 • 
Alex Frazer
Runlayer and AARM Partner to Secure Enterprise Agents

Runlayer and AARM Partner to Secure Enterprise Agents

Runlayer achieves AARM Extended Conformance (R1–R9), partnering with the Vanta-backed open specification to define how enterprises secure AI agents at runtime.
Apr 15, 2026
 • 
Tal Peretz
What Project Glasswing means for enterprise security

What Project Glasswing means for enterprise security

What Project Glasswing and Claude Mythos mean for enterprise security teams, and why your patch workflows, dependency management, and MCP governance need to evolve now.
Apr 11, 2026
 • 
Tal Peretz
The Danger of Fake MCP Servers

The Danger of Fake MCP Servers

Fake MCP servers pose a growing security risk, enabling data leaks, tool poisoning, and compromised AI behavior. Learn how these attacks work and how organizations can prevent them with proper controls and monitoring.
Apr 7, 2026
 • 
Tal Peretz
Runlayer + 1Password: Secure Credential Access for AI Agents

Runlayer + 1Password: Secure Credential Access for AI Agents

Runlayer and 1Password partner to bring secure, auditable credential access to autonomous AI agents. The integration lets enterprises inject secrets from 1Password vaults into agent sessions managed by Runlayer, replacing plaintext .env files with centralized governance, real-time retrieval, and full audit logging across human and non-human identities.
Mar 17, 2026
 • 
Tal Peretz
Honestly, MCP doesn’t “suck”

Honestly, MCP doesn’t “suck”

Garry Tan recently argued that MCP “sucks,” citing context-window bloat and weak authentication. This article breaks down why those criticisms miss the mark—and why MCP remains the better foundation for agents operating at enterprise scale.
Mar 12, 2026
 • 
Vitor Balocco
Scale MCP with Dynamic Tool use

Scale MCP with Dynamic Tool use

Dynamic tool use cuts token waste from MCP by replacing bulk tool loading with lightweight search, saving cost without custom implementation.
Feb 20, 2026
 • 
Vitor Balocco
OpenAI Agent Builder’s MCP Problem

OpenAI Agent Builder’s MCP Problem

OpenAI AgentKit/Agent Builder launched in Oct 2025 but, despite early hype, its limited integrations and weak security (e.g., unverified MCP servers, no namespace isolation, insufficient guardrails) create a large enterprise attack surface—prompting calls for controls like a trusted MCP catalog, tool gateway auditing, RBAC/least privilege, and stronger governance (e.g., via Runlayer).
Feb 19, 2026
 • 
Tal Peretz
Pwning OpenClaw in 50 Messages: Social Engineering Claude Opus Into Handing Over the Keys

Pwning OpenClaw in 50 Messages: Social Engineering Claude Opus Into Handing Over the Keys

A Claude Opus–powered OpenClaw agent with Slack and shell access was social-engineered in ~50 messages to rebind its UI, install ngrok, expose the dashboard publicly, reveal its gateway token, and approve the attacker’s device.
Feb 16, 2026
 • 
Alex Frazer
Unpacking the OWASP Top 10 for MCP

Unpacking the OWASP Top 10 for MCP

An overview of the OWASP MCP Top 10, highlighting the biggest security risks in MCP-enabled AI systems and the key safeguards teams can use to prevent them.
Feb 10, 2026
 • 
Alex Frazer
MCP Apps highlight the power of protocol governance

MCP Apps highlight the power of protocol governance

MCP Apps let tools render interactive UIs directly in chat via the same MCP protocol—not a new execution path. With Runlayer intercepting tool calls, resource fetches, and auth headers, existing MCP security controls apply from day one.
Jan 30, 2026
 • 
Tal Peretz
Announcing Box and Runlayer's partnership on Enterprise MCP

Announcing Box and Runlayer's partnership on Enterprise MCP

Connect AI agents to Box content with enterprise security. The official Box MCP server is live in the Runlayer marketplace, with identity enforcement, audit logging, and threat detection built in. Box customers can find Runlayer in the Box Integrations Center. Setup takes minutes.
Jan 27, 2026
 • 
Aidan Sochowski
MCP vs CLI Tools: Which is best for production applications?

MCP vs CLI Tools: Which is best for production applications?

CLI tools feel familiar to AI agents, but they break down in production due to brittle syntax, poor state management, and dangerous security assumptions. This post explains why CLI-based agent workflows fail and how a single-tool MCP using a known programming language offers a more reliable and secure alternative.
Jan 25, 2026
 • 
Vitor Balocco
Runlayer Product Update: 1.25.0

Runlayer Product Update: 1.25.0

This update is about momentum: moving faster in the CLI, getting clearer visibility into what’s running, and debugging with less friction. Expect smoother workflows, better control, and fewer surprises as you build and ship.
Jan 23, 2026
 • 
Engineering
MCP Prompt Injection Attacks: How to Protect Your AI Agents

MCP Prompt Injection Attacks: How to Protect Your AI Agents

Two near-invisible prompt injection attacks showed how attackers can bypass default enterprise guardrails and trigger silent, ongoing data exfiltration by exploiting user and model trust. Runlayer blocks these attacks by treating every input as untrusted until it passes continuously updated security models trained on the latest real-world exploits.
Jan 19, 2026
 • 
Jake Moghtader
Cursor Hooks + MCP Security: Official Runlayer Partnership Announcement

Cursor Hooks + MCP Security: Official Runlayer Partnership Announcement

Runlayer is an official Cursor Hooks launch partner. With Cursor Hooks, securely allow or deny MCP tool calls with Runlayer's enterprise MCP platform.
Dec 18, 2025
 • 
Marcin Jan Puhacz
The main takeaways from GitHub’s MCP Vulnerability

The main takeaways from GitHub’s MCP Vulnerability

GitHub’s MCP vulnerability revealed how AI agents can be weaponized through poisoned context in public repositories. This post analyzes the exploit, explains why permissions alone aren’t enough, and shares practical guardrails for preventing and mitigating agent-driven data exfiltration.
Dec 16, 2025
 • 
Vitor Balocco
Runlayer Joins Anthropic, OpenAI, & Google as AAIF Founding Member

Runlayer Joins Anthropic, OpenAI, & Google as AAIF Founding Member

The Linux Foundation has launched the Agentic Artificial Intelligence Foundation (AAIF), with Runlayer joining sponsors Anthropic, OpenAI, Google, AWS, Microsoft. AAIF now oversees the Model Context Protocol (MCP), reinforcing MCP as a rising standard for AI agent integration. Runlayer supports AAIF’s open, secure, and scalable AI development mission.
Dec 9, 2025
 • 
Andy Berman
Runlayer Raises $11M to Scale Enterprise MCP Infrastructure

Runlayer Raises $11M to Scale Enterprise MCP Infrastructure

Nov 17, 2025
 • 
Andy Berman
MCP Security Risks: Your AI Agent is Probably Leaking Data Right Now

MCP Security Risks: Your AI Agent is Probably Leaking Data Right Now

MCP adoption is accelerating across major platforms, but security risks—like malicious servers, prompt injection, and tool-level exploits—are growing just as fast. This post breaks down real attack scenarios that show how easily data can leak when MCP implementations are trusted by default. It also outlines practical defenses for users and builders, plus why companies need audited MCP catalogs, gateway proxies, and sandboxing to stay secure at scale.
Nov 12, 2025
 • 
Vitor Balocco
Why MCP builders are transitioning from DCR to OAuth CIMD

Why MCP builders are transitioning from DCR to OAuth CIMD

Over the last year, MCP has surged in adoption. To little surprise, this has introduced some scaling issues. One of these is client registration; previously, systems were rigged together by humans. Today, AI agents discover and interface with MCP servers freely, requiring a new paradigm for client communications.
Nov 7, 2025
 • 
Vitor Balocco
What is Dynamic Client Registration?

What is Dynamic Client Registration?

Tired of manually registering every AI agent with every OAuth server? Dynamic Client Registration (DCR) lets your agents authenticate with MCP servers at runtime, no human clicks required. Learn how DCR works, when to use it over traditional OAuth, and why it's becoming essential for scalable agentic systems.
Nov 6, 2025
 • 
Vitor Balocco