Anthropic isolates agent credentials from execution to unlock enterprise deployment

Anthropic has released two new security capabilities for Claude Managed Agents that address a critical enterprise deployment bottleneck: credential exposure. Self-hosted sandboxes, now in public beta, let enterprises run tool execution on their own infrastructure rather than on Anthropic's servers, while MCP tunnels, in research preview, connect agents to private servers without exposing credentials in the agent's context. Together, these features move authentication control to the network boundary instead of embedding it in the agent itself, reducing the blast radius if an agent is compromised or misbehaves.
Anthropic has released two new security capabilities for Claude Managed Agents that address a critical enterprise deployment bottleneck: credential exposure. Self-hosted sandboxes, now in public beta, let enterprises run tool execution on their own infrastructure rather than on Anthropic's servers, while MCP tunnels, in research preview, connect agents to private servers without exposing credentials in the agent's context. Together, these features move authentication control to the network boundary instead of embedding it in the agent itself, reducing the blast radius if an agent is compromised or misbehaves.
- Anthropic released self-hosted sandboxes (public beta) and MCP tunnels (research preview) for Claude Managed Agents to isolate credential handling from agent execution
- Self-hosted sandboxes run tool execution on enterprise infrastructure while keeping the agent orchestration loop on Anthropic's platform, creating a security boundary
- MCP tunnels enable agents to reach private servers through lightweight outbound-only gateways without credentials passing through the agent itself
- The split architecture differs from OpenAI's local execution approach by separating agent orchestration from tool execution, changing the threat model rather than just the deployment model
Credential exposure has been a major blocker for enterprise AI agent adoption. Most production deployments embed authentication tokens directly in agents, meaning a compromised or misbehaving agent becomes a vector for internal system compromise. Anthropic's architectural approach, which separates orchestration from execution, addresses this at the infrastructure level rather than relying on agent-level safeguards alone, setting a new baseline for how enterprise AI systems should handle sensitive access.
- Credential management is shifting from an application-layer problem to an infrastructure-layer problem, requiring orchestration teams to think about network topology and access control boundaries differently
- The split architecture creates a new technical differentiator in the agent platform market, with implications for how teams evaluate and compare solutions from different providers
- Enterprises will need to map their internal API and database access patterns to determine whether sandboxes or MCP tunnels are appropriate for each workflow, adding a new dimension to agent deployment planning
Our Briefing
Weekly signal. No noise. Built for founders, operators, and AI-curious professionals.
No spam. Unsubscribe any time.



