Running an AI agent with whatever credentials happen to be in the shell is basically the same mistake as running your app as root — feels fine until the agent makes a bad decision or gets manipulated. On a typical dev machine that's a personal AWS profile with admin access; on prod it's usually whatever the CI service account can touch, which is often a lot more than it should be.
The CI integration is the piece I'd actually lean on first. Most teams I've seen think about agent access controls after they've already deployed, at which point you're doing cleanup instead of prevention. Gating it in the pipeline means the access question gets answered before the agent is running against your Terraform state and live kube contexts.
Are you seeing any patterns in severity distribution — mostly cloud creds coming up critical, or are the kube context exposures landing higher than expected?