A human employee may retain access because their role has not changed. An agent can keep the same technical role while its operating reality changes completely. The model may be upgraded. The prompt may be edited. A tool may expose a new mutation. A memory source may be widened. A vendor API may change semantics. A workflow may shift from internal draft to customer-facing action.
The permission record has to know more than who can call the API. It needs to know which evidence justified the permission, which workflow it covered, what changed since approval, and what event should force recertification.
Permission debt scorecard
| Debt signal | What to inspect | Why it matters | First corrective action |
|---|
| Tool added after approval | Tool registry and run receipts | New capabilities can bypass old risk assumptions | Freeze high-risk calls until recertified |
| Model or prompt changed | Deployment history and eval evidence | Prior behavior proof may no longer apply | Re-run task-class evals before expansion |
| Owner changed | Agent owner and escalation path | No one may understand the original approval | Assign a current owner or narrow scope |
| Memory source widened | Retrieval policy and provenance | Old permissions may now act on broader context | Require scoped memory attestations |
| Permission unused for weeks | Invocation history | Dormant authority is hard to notice until abused | Revoke by default, restore with proof |
| Customer impact increased | Workflow classification | Draft risk is not execution risk | Move to approval-gated mode |
| Evidence expired | Last proof timestamp | Trust decays when the operating surface changes | Trigger renewal or downgrade |
The scorecard should be run as an operating review, not as a quarterly theater exercise. The point is to find the permissions that would embarrass the team if an incident review asked why they were still live.
The revocation rule serious teams need
The simplest rule is brutal and useful: if the evidence does not name the current tool boundary, current task class, current data source, and current consequence level, the permission is stale.
That does not mean every stale permission must be permanently removed. It means stale permissions should narrow until recertified. Read-only can remain where write access cannot. Draft mode can remain where execution cannot. Recommendation can remain where settlement cannot. The permission ladder should make downgrade cheaper than blind continuation.
Most teams do the opposite. They make expansion easy and revocation socially awkward. The agent worked last month, the stakeholder wants the workflow live, the security review was painful, and nobody wants to reopen it. That is permission debt compounding in real time.
The finance analogy that makes this legible
Permission debt becomes easier to explain when leaders compare it to a credit line. A bank does not approve one credit line forever because a borrower looked safe once. The line is tied to current information, covenants, payment history, and changing risk. Agent authority should be treated the same way.
That analogy helps because it avoids moral panic. The agent is not bad because its permission narrows. The organization is not anti-innovation because it asks for fresh proof. It is simply refusing to let an old underwriting decision govern a new risk profile.
The operating implication is that permission reviews should produce a balance sheet. Which permissions are current assets backed by evidence? Which are liabilities because they are stale, broad, or ownerless? Which should be written down immediately? That language gives security, product, finance, and operations a shared way to discuss autonomy without reducing the conversation to yes or no.
Where Armalo fits without pretending magic
In Armalo's architecture, pacts, Scores, attestations, disputes, and recertification are meant to make authority evidence-bearing. The useful product boundary is not "Armalo can make every agent safe." The serious boundary is narrower: Armalo can help teams represent the promises an agent made, the evidence behind its trust state, and the consequence when that evidence weakens.
Permission debt becomes tractable when trust records are queryable and tied to runtime decisions. If a tool boundary changes, the agent should not coast on an old score. If a dispute lands, the permission should narrow. If a fresh attestation proves reliable behavior in the new task class, the permission can expand again.
That is how trust becomes operational: not by producing a nicer dashboard, but by changing what the agent may do next.
The operating habit
Pick one production agent and list every permission it has. For each permission, write the proof that earned it. If the proof is missing, stale, or scoped to a different workflow, downgrade the permission before expanding the agent.
This exercise is uncomfortable because it exposes how much autonomy is granted through memory, habit, and optimism. That discomfort is valuable. It is the feeling of an operating model becoming real.
FAQ
Is permission debt just another name for over-permissioning?
No. Over-permissioning is broad access. Permission debt is stale justification. A permission may have been reasonable when granted and still become dangerous after the model, workflow, data source, tool, or consequence changes.
How often should agent permissions be reviewed?
Review high-risk permissions whenever the agent's tool boundary, model, prompt, memory source, owner, or consequence level changes. Calendar reviews are useful, but event-triggered reviews catch the real drift.
What should buyers ask vendors?
Ask whether agent permissions expire, what evidence renews them, and whether stale or disputed evidence automatically narrows authority. A vendor that cannot answer is asking you to accept private confidence.
Bottom line
The next agent security crisis will not look like one dramatic exploit. It will look like dozens of old permissions that no longer match the evidence behind them. The winning teams will not merely monitor agents. They will make permission a renewable claim.