
Agent security
OAuth was built for apps and human-driven interactions—not autonomous, multi-step AI agents. As organizations rely on AI for operational work, the limitations of OAuth become clearer—and riskier.
OAuth was built for apps and human-driven interactions—not autonomous, multi-step AI agents. As organizations increasingly rely on AI to perform operational work, the limitations of OAuth become clearer—and riskier.
OAuth 2.0 assumes three things:
But autonomous agents break all three assumptions.
This is fundamentally incompatible with OAuth’s model, which presumes a predefined set of actions and a deterministic application.
Academic Support:
Research from Stanford HAI (2024) shows that LLM agents routinely produce “unbounded and unpredictable actions” even when guardrailed. Agents frequently deviate from intended workflows due to reasoning drift.
OAuth never anticipated a world where applications improvise.
OAuth scopes map to provider-defined permissions, not to user intent or agent-level behavior.
Example: Slack scopes
chat:write → allows sending messages to any channelchannels:history → read history of all public channelsusers:read → read the entire company directoryNow consider an AI agent whose purpose is to:
“Send a message to the #marketing channel only when summarizing weekly metrics.”
OAuth provides no way to express:
The scope is either granted—or not. OAuth lacks resource-level constraints, contextual rules, and intent validation.
Industry Note:
Slack, Google, and Microsoft intentionally design scopes broadly because granular scopes are difficult to manage for typical app developers. But broad scopes create massive risk when used by autonomous agents.
OAuth connects:
OAuth does not connect:
In AI systems, the agent is often the one “deciding” what action to take—not the human.
The Result:
You can have a fully valid OAuth token, yet:
OAuth provides initial consent, not ongoing identity proof.
Research:
NIST SP 800-63 (Digital Identity Guidelines) emphasizes continuous identity assurance—something OAuth does not provide or enforce.
AI agents hallucinate API calls the same way they hallucinate text.
Examples documented in industry testing:
OAuth will allow these actions if the scope allows them—even if the intent does not.
OAuth cannot ask:
OAuth has zero semantic understanding of business logic, tool semantics, user boundaries, agent intent, and operational risk. It simply checks token validity and scope.
Academic Support:
The “LLM Safety & Reliability” 2024 survey (Stanford/Berkeley/Microsoft Research) highlights that “permissioned but unsafe actions” are one of the most common agent failure modes.
Enterprises require the ability to say:
“This agent can do X, for user Y, under condition Z, and nothing else.”
OAuth cannot express:
OAuth scopes are global, not transactional.
Example: Google Drive
Even the restrictive drive.readonly scope allows reading every file the user can access. If the agent’s job is to summarize a single document, accessing any other file is excessive privilege.
Industry Trend:
Google’s BeyondCorp and Microsoft’s Entra PIM emphasize that modern systems require dynamic access checks, not scope-based static grants. OAuth predates this shift.
Agents frequently chain actions across multiple tools:
OAuth sees none of this as a single workflow. It sees multiple tokens, multiple APIs, multiple providers, no shared identity context, and no centralized policy.
This fragmentation creates risk:
OAuth is provider-level authorization. Agents need system-level authorization.
IETF Commentary:
The GNAP working group (successor to OAuth) explicitly calls out that OAuth 2.0 lacks native support for continuous authorization, delegated capabilities, and multi-party access orchestration. These are foundational needs for AI agents.
Enterprise audit requirements include:
OAuth provides logs for:
That’s it.
Every agent action performed after token issuance happens outside OAuth’s visibility.
This creates governance gaps:
This is especially problematic in regulated industries (financial services, healthcare, gov).
The original OAuth 2.0 spec (RFC 6749) defines the framework for delegation, consent, token issuance, and third-party application access. It does not define tool-level permissioning, continuous authorization, intent verification, agent/action risk scoring, cross-service permission mediation, dynamic policies, multi-user identity mapping, or hallucination prevention.
The gap between OAuth’s human-driven model and AI agents’ autonomous behavior continues to widen. As Gartner notes in its 2024 IAM report, modern authorization challenges require “policy-based, contextual access frameworks” that go far beyond OAuth’s static scope design.
OAuth is foundational for modern authentication and authorization. It’s proven, battle-tested, and necessary.
But OAuth alone is not designed for autonomous agents, because:
In short:
OAuth authenticates access.
AI agents need something that governs every action.
As organizations adopt agents for real operational work, we need a layer above OAuth—not replacing it, but complementing it—one designed for the realities of autonomous, multi-step, cross-tool AI behavior.