v1.0
L1 EssentialAutomated verification
2.3 Capability Boundaries
2. Capability & Authorization — What can this agent do?
Description
Agent capabilities MUST be enforced at runtime, not just declared.
Rationale
Declaration without enforcement is security theater. Runtime enforcement blocks unauthorized actions.
Audit Procedure
1. Test if agent can exceed declared capabilities 2. Attempt unauthorized file access, network calls 3. Check for capability enforcement middleware
Remediation
1. Implement capability checking middleware 2. Use sandbox with enforced boundaries 3. Implement network egress filtering
Framework Mappings
CIS Control 6.7NIST PR.AC-4