People-Pleasers: Why AI Agents Go Rogue and How to Govern Them at Scale with Shreyans Mehta
カートのアイテムが多すぎます
カートに追加できませんでした。
ウィッシュリストに追加できませんでした。
ほしい物リストの削除に失敗しました。
ポッドキャストのフォローに失敗しました
ポッドキャストのフォロー解除に失敗しました
-
ナレーター:
-
著者:
Agent Gone Rogue: How to Build Behavioral Guardrails for Agentic AI in the Enterprise with Shreyans Mehta
Host John Richards welcomes back Shreyans Mehta, CTO and co-founder of Cequence, for a return visit that couldn't be more timely. Two years ago, they were talking about securing AI at the application layer. Now enterprises are running thousands of autonomous agents around the clock, and the security perimeter has fundamentally changed. In this episode, John and Shreyans dig into the new class of risk that comes with agentic AI—and what it actually takes to govern it.
When Your AI Agent Deletes the System to Delete the Email
Shreyans opens with a concept that reframes the whole conversation: AI agents aren't just a productivity tool—they're autonomous actors with access to your most sensitive systems. The problem isn't that they'll go rogue on purpose. It's that they're people-pleasers. They will exhaust every available path to complete a task, which means broad access will get used in ways you never anticipated.
He shares two stories that land hard. First, a research case study called Agents of Chaos, where an agent tasked with deleting a saved password—lacking email-delete permissions—resolved the problem by deleting the system instead. Second, a real customer scenario where a Claude Code-based agent spent an entire weekend trying to upgrade a legacy codebase and, when it couldn't fetch a file due to a missing SHA value, started guessing characters one by one—for hours.
The fix isn't just identity and access management—it's a new layer Shreyans calls agent behavioral analytics. Start with a plain-English job description. Cequence translates that into deterministic rules: what the agent can access, what it can send, what it can never do. Every interaction is monitored against that job description in real time—not just logged, but enforced. When the email assistant starts forwarding sensitive data to an unknown address, it gets stopped, not flagged.
Questions We Answer in This Episode
- Why is identity management alone not enough to secure AI agents?
- What is the token flattening problem, and why does it matter for enterprise security?
- How do you translate a plain-English agent job description into deterministic access controls?
- What does agent behavioral analytics look like in practice—and who owns it inside an organization?
Key Takeaways
- AI agents are already in your environment—the only question is whether you're governing them.
- Every agent needs a job description that converts into deterministic rules, not just an identity token.
- Monitoring must be tied to behavior, not just access logs—and it has to stop bad actions, not just detect them.
- Agent sprawl demands a new security category built for non-human, 24/7 actors.
If your organization is running agentic AI and nobody owns the behavioral layer yet, this episode is a good place to start. The enterprises getting it right aren't waiting for security teams to green-light every agent—they're using tools that translate intent into guardrails automatically. Give it a listen, then check out the resources below.
Resources
- Shreyans Mehta, Cequence: LinkedIn
- Cequence AI Gateway
- Cequence on LinkedIn
- CyberProof
- Learn more about Paladin Cloud
- Got a question? Ask us here!
- (00:00) - Welcome to Cyber Sentries
- (01:08) - Shreyans Mehta
- (01:57) - Changes Since His First Visit
- (04:03) - Finding Ways to Feel More Comfortable
- (11:24) - Getting a Handle on It
- (16:11) - Access and Profiles
- (21:55) - Transitioning to Rules
- (24:24) - How Teams Use This
- (26:49) - Playing Out in the Real World
- (27:49) - Learning More
- (29:07) - Wrap Up