Security and Safety
Permission Models
Permission models apply the principle of least privilege to agents: each agent receives only the access it needs to complete its assigned task, nothing more. This topic appears after the autonomy spectrum in the learning sequence because you cannot design meaningful permissions until you know what level of autonomy you are granting. An agent that only reads files needs a very different permission boundary than one that writes to a database or calls external APIs, and the cost of getting it wrong scales with the autonomy level: a highly autonomous agent with overly broad permissions converts any prompt injection into a system-wide breach.
resources
Claude Code: Permission Levelsdocs.anthropic.comClaude Code's tiered permission system for agentic actions (docs.anthropic.com)OWASP: Excessive Agencygenai.owasp.orgRisks of poorly designed permission models in LLM systems (genai.owasp.org)Capability-Based Securityen.wikipedia.orgThe security model that informs modern agent permission design (wikipedia.org)Role-Based Access Controlcsrc.nist.govNIST's role-based access control standard applicable to agent authorization (csrc.nist.gov)