Back to Blog
Insights

2026: The Year of the Agent, and the Year of the Breach

Two forecasts, same primitive — and the identity layer that has to catch up

Know Your Agent (KYA)May 11, 20265 min read

The Prediction Came From Both Sides

“The year of the agent” wasn't a marketing line—it came from hardware vendors shipping the silicon, security firms watching the incidents, and regulators drafting the rules.

We're nearly halfway through 2026. The label held. So did the harder prediction: this is also the year agentic AI became the top breach vector.

At Snapdragon Summit in September 2025, Qualcomm CEO Cristiano Amon called 2026 “the year of agents.” The framing was a hardware story—on-device inference, NPUs in shipping handsets, agents running locally instead of round-tripping to a cloud.

That same quarter, Experian's 2026 Data Breach Forecast named agentic AI as the year's top emerging breach vector. The reasoning was structural: an agent with credentials to your inbox, file system, and payment instruments is a privileged identity. Privileged identities are how breaches happen. Make one non-deterministic and prompt-injectable, and you've shortened the kill chain.

/ Takeaway

Same primitive—an autonomous process acting with delegated authority—read as productivity by one industry and as breach by the other. Both were right.

What Actually Changed

The shift isn't that LLMs got smarter. It's that an agent's surface area grew faster than the controls around it. We've covered each expansion as it landed:

Wallets

Coinbase's Agentic Wallets gave agents funded accounts, programmable spending limits, and x402 machine-to-machine payment rails.

Checkout

Amazon's Rufus moved from chatbot to auto-buy on price triggers. Walmart shipped Sparky and the Element platform.

Legal precedent

A federal court told Perplexity it could not log into a user's Amazon account on their behalf—the first major ruling on an agent borrowing a human's credentials.

Payment standards

Google donated AP2 to the FIDO Alliance and added a Human-Not-Present mode. We shipped a KYA→AP2 translation layer so trace JWTs produce AP2 mandates without bespoke integration.

Each is a story about a new capability. None is a story about identity. That's the gap.

You Can't Authorize an Agent You Can't Identify

Fraud systems were built around one question: is the human real, and are they who they claim to be? Mouse movement, keystroke cadence, session timing were the signals.

Agents have none of those. We wrote up the failure mode: legacy fraud systems either block legitimate agent traffic as suspected bots, or wave it through because it carries a valid stored credential. Both happen at the same time.

The fix isn't better bot detection. It's making agents present a verifiable identity at the boundary—naming which operator runs the agent, which principal authorized the session, what the agent is scoped to do, and whether the operator stands behind it under pre-dispute terms.

That's what KYA ships:

KYB-verified operators

The entity behind an agent has the same standing as a merchant of record.

Ed25519-signed trace JWTs

Every agent action carries a cryptographic record of who authorized it via X-KYA-Trace-ID.

Pre-dispute APIs

Merchants can flag a stop-loss or scope-exceeded event before it escalates to a chargeback.

AP2 mandate translation

The same trace works for AP2-aware processors without a second integration.

It isn't a firewall. It's identity infrastructure for actors the existing rails weren't built to recognize.

The Regulatory Tailwind Is Specific

California's SB 53—the Transparency in Frontier AI Act, signed September 2025—is the most-cited example. Frontier developers must publish frameworks for assessing catastrophic risk and report critical safety incidents to the state. It is not a generalized “AI transparency” mandate and does not directly govern downstream agent deployments, but it sets a template: AI activity is no longer presumed private to the operator.

The EU AI Act's transparency obligations for general-purpose AI took effect August 2025 and apply to most models powering production agents. Both regimes want the same thing: a tamper-evident record of what an agent did, when, and under whose authority. Signed traces produce one; pre-dispute logs keep it useful after the fact.

What's Likely To Bite Next

Three things, in order:

1
The first major agent-credential breach with named victims

Experian's forecast was structural, not a calendar entry. When it lands, the conversation shifts from “should agents have credentials” to “prove which agent did what.”

2
A standards convergence around agent identity

AP2, A2A, MCP, and the trace JWT space are still parallel tracks. The first cross-platform incident response will make the cost of fragmentation visible enough to force a primary.

3
Insurance underwriting for agent operators

Carriers price what they can measure. KYB status, signed traces, pre-dispute response time, validation history. Pricing them turns operator hygiene into a business requirement.

Verify the Agents at Your Boundary

KYB-verified operators, signed traces, pre-dispute APIs, AP2 translation. The identity layer for actors the existing rails weren't built to recognize.

Request a Demo