What is Permission Creep (Agent)?

2 min read Updated

The gradual accumulation of MCP tool permissions over time as new capabilities are added to an agent's configuration but old, unnecessary ones are never revoked. A common problem in long-running agent deployments.

WHY IT MATTERS

Permission creep is a well-known problem in traditional IT — employees accumulate access rights as they change roles, and nobody revokes the old ones. The same dynamic plays out with AI agents, often faster.

A development team adds a new MCP server for a specific task. The agent's configuration is updated to include it. The task completes, but the server stays in the configuration. Months later, the agent has access to fifteen servers when it actively uses three. Each unused permission is latent risk — attack surface that serves no operational purpose.

With AI agents, permission creep is accelerated by the pace of tooling. New MCP servers are published weekly. Developers experiment by adding them to agent configurations. The configuration file grows monotonically — additions are common, removals are rare. Nobody audits agent permissions because it is not obviously broken.

The compounding effect is what makes permission creep dangerous. Each individual addition seems reasonable. The aggregate creates an agent with access to file systems, databases, APIs, cloud infrastructure, and communication tools — far beyond any single task's requirements.

HOW POLICYLAYER USES THIS

Intercept combats permission creep by decoupling tool access from MCP client configuration. Even if an agent's client config lists many servers, Intercept's YAML policies define what is actually permitted. Policies are version-controlled and reviewable in pull requests, making permission additions visible and auditable. Regular policy audits are straightforward — compare the policy allowlist against actual tool usage from Intercept's audit logs to identify permissions that should be revoked.

FREQUENTLY ASKED QUESTIONS

How is agent permission creep different from human permission creep?
The mechanism is identical — permissions accumulate over time without revocation. But agents often have broader initial access than humans, and the rate of change is faster because adding MCP servers is trivially easy compared to provisioning human access.
How often should I audit agent permissions?
At minimum, quarterly — or whenever the agent's task scope changes. With Intercept's audit logs, you can automate this: flag any tool in the policy that has not been invoked in 30 days as a candidate for removal.
Can permission creep be prevented entirely?
A strict policy-as-code workflow helps significantly. Require pull request approval for any policy change, enforce expiry dates on temporary permissions, and use Intercept's fail-closed mode so new tools are denied until explicitly allowed.

FURTHER READING

Enforce policies on every tool call

Intercept is the open-source MCP proxy that enforces YAML policies on AI agent tool calls. No code changes needed.

npx -y @policylayer/intercept
github.com/policylayer/intercept →
// GET IN TOUCH

Have a question or want to learn more? Send us a message.

Message sent.

We'll get back to you soon.