Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

EuroHPC and Bull collaborate to bring AI supercomputer to Mimer AIF

Lotus Wiper Malware Destroys Venezuelan Energy Systems

Texas A&M’s optical propulsion technology could cut travel time to Alpha Centauri to 20 years

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » When cross-app permissions lead to risks
Identity

When cross-app permissions lead to risks

By April 22, 2026No Comments6 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

On January 31, 2026, researchers revealed that Moltbook, a social network built for AI agents, left its database widely available, exposing 35,000 email addresses and 1.5 million agent API tokens across 770,000 active agents.

The more worrying part was in the private messages. Some of these conversations held clear-text third-party credentials, including OpenAI API keys, shared between agents and stored in the same unencrypted table as the tokens needed to hijack the agents themselves.

This is a form of harmful combination. That is, a breakdown of permissions between two or more applications bridged by an AI agent, integration, or OAuth grant that no single application owner has ever signed off on as a unique risk surface.

Moltbook’s agents sat on that bridge, transporting credentials for the host platform and external services wired by the user out of sight, even from the platform owner. Most SaaS access reviews still examine one application at a time. This is a blind spot that attackers are targeting.

How toxic combinations are formed

Toxic combinations rarely result from one bad decision. These appear when an AI agent, integration, or MCP server bridges two or more applications through OAuth grants, API scopes, or tool usage chains. The bridge itself is something that no one has reviewed, so each side of the bridge looks fine on its own.

As an example, imagine a developer installs an MCP connector that allows the IDE to post code snippets to a Slack channel upon request. A Slack admin signs off the bot. The IDE administrator signs off the outgoing connection. Neither acknowledges the trust relationship that exists between source editing and business messaging the moment both sides are up and running. This works in both directions. Prompt injection within the IDE pushes sensitive code to Slack, and instructions embedded in Slack are returned to the IDE context in the next session.

You’ll see the same shape wherever an AI agent bridges Drive and Salesforce, a bot connects a source repository to a team channel, or an intermediary makes two apps trust each other through permissions that each look fine.

Why single app reviews are overlooked

Conventional access reviews rarely capture this shape. It’s a tension in the realm that modern SaaS has carved out. These include non-human identities such as service accounts, bots, and AI agents, with no human behind them, trust relationships formed at runtime rather than provisioning time, and OAuth and MCP bridges that connect between apps without the governance catalog knowing.

Answering “Who owns this scope and the other two scopes, and what can they accomplish together?” becomes even more difficult when the scope in question resides on a token that no one has provisioned through the identity system.

The telemetry gap is growing pretty fast.

AI agents, MCP servers, and third-party connectors are now spread across two or three adjacent apps by default, and non-human identities outnumber human identities in most SaaS environments. The Cloud Security Alliance’s State of SaaS Security 2025 report found that 56% of organizations are already concerned about over-privileged API access in SaaS-to-SaaS integrations.

something worth thinking about

Bridging the gap primarily involves moving reviews from within each app to between apps. Here are some things worth considering to deal with this type of problem.

Areas to review What it looks like in practice Non-human ID inventory All AI agents, bots, MCP servers, and OAuth integrations are placed in the same registry as user accounts, with owner and review date. Cross-app scope granting New write scopes on an identity that already holds a read scope in another app are flagged before approval, not after approval. Bridge Review at Creation Every connector that links two systems has a review trail that specifies both sides and the trust relationship between them. Long-lived Token Health Tokens whose activity deviates from the scope for which they were originally granted are subject to revocation rather than renewal. Runtime Drift Monitoring Anomalies in cross-app scope and identities operating across new app combinations indicate a toxic combination is forming.

These are procedural disciplines rather than product choices, and any access review tool in place will work. In reality, it is difficult to see these connections at scale without a platform built to continuously monitor runtime graphs. Manual review does not allow you to scale beyond the first few dozen integrations.

Where does a dynamic SaaS security platform fit?

A dynamic SaaS security platform automates cross-app views set by procedural reviews. Dynamic SaaS Security continuously monitors the runtime graph as IGA inventories onboard system roles. That is, which identities exist, which apps have access, which scopes exist based on which tokens, which trust relationships are attached since the last provisioning review, and so on.

The bridges these platforms need to catch are created at the speed of MCP installs or OAuth consent clicks, so monitoring must be done continuously.

Reco is an example of this category. Its platform connects identities, permissions, and data flows across SaaS environments, so the combination of Slack, Drive, and Salesforce scopes is evaluated as one publication rather than three separate authorizations.

The first step is to discover all AI agents, integrations, and OAuth identities operating across your environment. This way, there is actually an inventory that cross-app reviews depend on. Agents that security teams didn’t know existed, or that secretly gained new connections after initial onboarding, surface alongside authorized agents.

Reco’s AI agent inventory. Shows discovered agents connected to GitHub.

Once the agent inventory is complete, Reco’s knowledge graph maps all human and non-human identities to the apps they reach and the bridges between them. When an MCP server connects an IDE to a messaging channel or an AI agent connects a document store to a CRM, that combination is automatically displayed in the graph and flagged as a breakdown of permissions that are not granted by a single app owner.

Reco’s knowledge graph. Demonstrates a toxic combination of Slack and Cursor.

From there, Reco will catch the moment an integration starts operating beyond its authorized scope and revoke dangerous access before anyone has a chance to use it. Chains, not apps, are subject to review, and it is this change that makes harmful combinations visible in the first place.

For most organizations, the next breach will not be announced as a new zero-day. It appears that the agents are doing exactly what they are authorized to do, right down to theft. Whether it’s discovered at approval time or recorded in post-mortem depends on someone being able to see the full chain.

Reco’s Dynamic SaaS Security platform was built to see the entire chain.

Was this article interesting? This article is a contribution from one of our valued partners. Follow us on Google News, Twitter, and LinkedIn to read more exclusive content from us.

Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleMicrosoft patches critical CVE-2026-40372 privilege escalation bug in ASP.NET Core
Next Article Texas A&M’s optical propulsion technology could cut travel time to Alpha Centauri to 20 years

Related Posts

Lotus Wiper Malware Destroys Venezuelan Energy Systems

April 22, 2026

Microsoft patches critical CVE-2026-40372 privilege escalation bug in ASP.NET Core

April 22, 2026

New LOTUSLITE variant of Mustang Panda targets Indian banks and Korean policy world

April 22, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

EuroHPC and Bull collaborate to bring AI supercomputer to Mimer AIF

Lotus Wiper Malware Destroys Venezuelan Energy Systems

Texas A&M’s optical propulsion technology could cut travel time to Alpha Centauri to 20 years

When cross-app permissions lead to risks

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.