Agents and scripts access freely
No control over session duration
Non-compliant with MCP spec
No traceability of who called what
Open endpoints risk data leaks
Authorized agents get scoped access
Short lived tokens reduce risk surface
OAuth 2.1, PKCE, DCR compliant
Identity-scoped, auditable agent calls
Explicit access guards critical actions