API keys and credentials. Agents operate inside authorized permissions where firewalls can't see. Traditional security models ...