Can this agent read secrets?
If yes, can it read all secrets or only scoped temporary credentials?
Checklist
Before AI coding agents touch repositories, terminals, Git, network, or cloud tooling, use this checklist to reduce blast radius and create audit evidence.
Track agent ID, owner, repo, branch, provider, model, tool, session, expiration, and lifecycle status.
Block `.env`, `.env.*`, `*.pem`, `*.key`, `id_rsa`, `secrets.*`, cloud credentials, database URLs, and SaaS tokens.
Start with `rm -rf`, `DROP DATABASE`, `TRUNCATE`, `terraform destroy`, `kubectl delete`, force push, and `curl unknown | bash`.
Require review for auth, payments, infra, CI/CD, production configs, migrations, backups, and customer-data exports.
Log outbound requests, enforce allowlists, flag unknown domains, detect uploads, and classify model/tool endpoints.
Deny protected-branch pushes, force pushes, tag deletion, and secret-containing pushes. Attach PR audit reports.
Never store raw secrets in audit logs, PR reports, terminal transcripts, or prompt/tool context.
Record session start/end, file access, commands, network requests, policy decisions, approvals, denials, redactions, and reports.
Buyer readiness
If the answer is no, the agent is probably inheriting too much trust from the human developer or local machine.
If yes, can it read all secrets or only scoped temporary credentials?
If yes, what policy denies destructive operations and who approves exceptions?
If no, the adoption path is weak for SOC 2, incident response, and enterprise security reviews.