On January 31, 2026, researchers disclosed that Moltbook, a social community constructed for AI brokers, had left its database vast open, exposing 35,000 e mail addresses and 1.5 million agent API tokens throughout 770,000 lively brokers.
The extra worrying half sat contained in the non-public messages. A few of these conversations held plaintext third-party credentials, together with OpenAI API keys shared between brokers, saved in the identical unencrypted desk because the tokens wanted to hijack the agent itself.
That is the form of a poisonous mixture: a permission breakdown between two or extra functions, bridged by an AI agent, integration, or OAuth grant, that no single software proprietor ever licensed as its personal danger floor.
Moltbook’s brokers sat at that bridge, carrying credentials for his or her host platform and for the surface providers their customers had wired them into, in a spot that neither platform proprietor had line of sight into. Most SaaS entry critiques nonetheless study one software at a time, which is the blind spot attackers are studying to focus on.
How Poisonous Mixtures Kind
Poisonous combos are not often the product of a single dangerous resolution. They seem when an AI agent, an integration, or an MCP server bridges two or extra functions via OAuth grants, API scopes, or tool-use chains, and all sides of the bridge seems to be fantastic by itself as a result of the bridge itself is what nobody reviewed.
For instance, think about a developer installs an MCP connector so their IDE can submit code snippets right into a Slack channel on request. The Slack admin indicators off on the bot; the IDE admin indicators off on the outbound connection; neither indicators off on the belief relationship between supply enhancing and enterprise messaging that exists the second either side are dwell. It runs in each instructions: immediate injections contained in the IDE push confidential code into Slack, and directions planted in Slack movement again into the IDE’s context on the subsequent session.
The identical form seems wherever an AI agent bridges Drive and Salesforce, a bot wires a supply repository right into a workforce channel, or any middleman makes two apps belief one another via a grant that appears regular in every.
Why Single-App Evaluations Miss Them
Typical entry overview not often catches this form. It strains within the territory fashionable SaaS has opened up: non-human identities like service accounts, bots, and AI brokers with no human behind them, belief relationships that kind at runtime fairly than at provisioning time, and OAuth and MCP bridges are wired between apps with out the governance catalog understanding.
Answering “who holds this scope plus these two different scopes, and what can these scopes accomplish collectively” turns into a lot tougher as soon as the scopes in query dwell on a token no one provisioned via any id system to start with.
The telemetry hole is widening fairly quick.
AI brokers, MCP servers, and third-party connectors now sit throughout two or three adjoining apps by default, and non-human identities outnumber human ones in most SaaS environments. The Cloud Safety Alliance’s State of SaaS Safety 2025 report discovered that 56% of organizations are already involved about over-privileged API entry throughout their SaaS-to-SaaS integrations.
Issues Value Pondering About
Closing the hole is basically a matter of shifting the place overview occurs, from inside every app to between them. Listed here are a handful of issues price serious about to deal with such a difficulty:
| Space to overview | What it seems to be like in observe |
|---|---|
| Non-human id stock | Each AI agent, bot, MCP server, and OAuth integration sits in the identical register as a consumer account, with an proprietor and a overview date. |
| Cross-app scope grants | A brand new write scope on an id that already holds learn scopes in a special app is flagged earlier than approval, not after. |
| Bridge overview on creation | Each connector that hyperlinks two methods has a overview path naming either side and the belief relationship between them. |
| Lengthy-lived token hygiene | Tokens whose exercise has drifted from the scopes they had been initially granted are candidates for revocation, not renewal. |
| Runtime drift monitoring | Cross-app scope anomalies and identities working throughout a brand new app mixture are the tells a poisonous mixture is forming. |
These are procedural disciplines greater than product selections, and so they work with no matter entry overview tooling is in place. The fact is that seeing these connections at scale is tough with no platform constructed to observe the runtime graph constantly. Guide overview would not scale previous the primary few dozen integrations.
The place Dynamic SaaS Safety Platforms Match In
Dynamic SaaS security platforms automate the cross-app view that procedural overview units up. The place IGA inventories roles for onboarded methods, dynamic SaaS security watches the runtime graph constantly: which identities exist, which apps they contact, what scopes dwell on which tokens, and which belief relationships have been wired in after the final provisioning overview.
The monitoring has to run constantly, as a result of the bridges these platforms must catch are created on the velocity of an MCP set up or an OAuth consent click on.
Reco is one instance of this class. Its platform connects identities, permissions, and knowledge flows throughout the entire SaaS setting, so a mixture of scopes in Slack, Drive, and Salesforce is evaluated as one publicity fairly than three separate approvals.
Step one is discovering each AI agent, integration, and OAuth id working throughout the setting, so the stock any cross-app overview is determined by really exists. Brokers that security groups didn’t know had been there, or brokers that quietly gained new connections after preliminary onboarding, floor alongside the sanctioned ones.
![]() |
| Reco’s AI Brokers Stock, exhibiting found brokers linked to GitHub. |
As soon as the brokers are inventoried, Reco’s Information Graph maps each human and non-human id to the apps it reaches and the bridges between them. When an MCP server connects an IDE to a messaging channel, or an AI agent wires a doc retailer right into a CRM, the graph surfaces the mixture mechanically and flags it as a permission breakdown no single app proprietor licensed.
![]() |
| Reco’s Information Graph, exhibiting a poisonous mixture between Slack and Cursor. |
From there, Reco catches the second an integration begins behaving exterior what it was authorized for, and revokes dangerous entry earlier than anybody will get an opportunity to make use of it. The chain, fairly than the app, turns into the factor you overview, and that shift is what makes poisonous combos seen within the first place.
The subsequent breach at most organizations will not announce itself with a brand new zero-day. It’ll appear like an agent doing precisely what it was licensed to do, during to exfiltration. Whether or not that will get caught at approval time or written up in a autopsy comes down as to whether anybody can see the total chain.
Seeing the total chain is what Reco’s Dynamic SaaS Safety platform was constructed to do.





