The 15 Principles of Secure Agentic Systems

~ Craig McLuckie, Stacklok CEO and Founder

Craig McLuckie
Stacklok CEO, Craig McLuckie
Research Paper

The 15 Principles of Secure Agentic Systems

Our users make 4M tool calls every month (doubling every month)

Our Kubernetes operator is in production at multiple Global 2000 firms

Our open source platform, ToolHive has external maintainers and a growing community of contributors

Frequently asked questions

The highest-impact risks are credential mismanagement (agents running on shared or user-level credentials), unconstrained tool access (agents with more permissions than their task requires), and absent runtime isolation (code execution without a sandbox boundary). These risks compound at scale: what’s a contained incident with one agent becomes a systemic exposure with hundreds.

Explicit identity means every agent has its own uniquely issued, scoped credential — not a copy of its user’s credentials or a shared service account. It matters because when an agent’s credential is compromised, you need to isolate and revoke it without affecting every other system that credential touches. OAuth 2.0 and SPIFFE are the emerging standards for this.

Least-privilege for agents cannot be enforced through system prompt instructions alone — a sufficiently adversarial input can override behavioral guardrails. Scoped authorization must be implemented at the infrastructure layer: through scoped API keys, role-based tool inventories, and access controls the agent cannot reason its way around. The MCP layer is where this enforcement should live.

Each MCP server is third-party code running inside your environment with access to your agent’s context and credentials. Container isolation ensures that if one MCP server is compromised — through a supply chain attack or a poisoned tool — the blast radius is contained to that server’s execution environment and does not propagate to adjacent systems or agent state.

Here are some examples: Stacklok runs every MCP server in an isolated container by default, implementing a runtime boundary. Stacklok’s enterprise platform adds per-request identity via OIDC/OAuth and Okta/Entra ID integration, supply chain provenance attestation, immutable audit logging via OpenTelemetry, and a curated registry with admin-controlled tool governance.