Natoma Blog

Shadow Agents: The New Shadow IT

Paresh Bhaya

Technical tips

You've seen this movie before. The ending is worse this time.

Every enterprise security leader over 35 remembers the shadow IT era. Engineers adopted Dropbox before IT approved it. Marketing bought Salesforce on a credit card. Developers spun up AWS accounts that nobody tracked.

The cleanup took years. Some organizations are still doing it.

Shadow agents follow the same pattern, with a critical difference: the blast radius is orders of magnitude larger.

A shadow SaaS app stored files in the wrong place. A shadow agent reads your production database, calls your CRM API, queries your cloud logging infrastructure, and triggers workflows in your ticketing system. All in one prompt. All with the user's credentials. All invisible to your security team.

MCP made this inevitable. The Model Context Protocol standardizes how AI agents connect to enterprise tools. That's powerful. It's also trivially easy to set up. An engineer can configure an MCP server in their coding assistant in under five minutes. No IT ticket. No approval workflow. No audit trail.

Multiply that by every developer, data scientist, and power user in your organization. The result: agent sprawl at a speed and scale that makes the SaaS sprawl era look manageable.

What a shadow agent actually looks like

A shadow agent is any AI agent or MCP server running outside IT and security governance. It's not malicious. It's well-intentioned engineers solving real problems. That's what makes it hard to stop and dangerous to ignore.

Here's what happens in practice:

Monday morning. A platform engineer configures an MCP server in Cursor that connects to the company's PostgreSQL database and AWS CloudWatch. They need it to debug a production issue. It works. The query is faster than writing SQL manually. They keep it.

Tuesday. They add a second MCP server for Jira so the agent can pull ticket context alongside the logs. They share the config with their team's Slack channel.

Wednesday. Three more engineers copy the config. Two of them modify it to add connections to the internal secrets manager and the deployment pipeline.

Friday. Five engineers have MCP servers with read access to production databases, cloud infrastructure, ticketing systems, secrets management, and CI/CD pipelines. None of these connections appear in any IT inventory. No access review has occurred. No policy governs what these agents can do.

This is not a hypothetical. Discovery scans find an average of 225 MCP servers per enterprise, most of them unknown to security teams.

Why the shadow IT playbook doesn't work for shadow agents

When shadow SaaS became a problem, security teams had a relatively clean response: discover the apps, evaluate the risk, approve or block, migrate data if needed. The cycle took weeks to months, but the apps were static. They didn't change behavior between discovery and remediation.

Shadow agents are different in three ways that break the old playbook.

The blast radius is dynamic, not static

A SaaS app accesses whatever data you put into it. An MCP-connected agent accesses whatever the user's credentials allow, and it decides at runtime what to access based on the prompt. The same MCP server configuration that queries a staging database on Monday might query production on Tuesday because the user asked a different question.

You can't evaluate the risk of a shadow agent by looking at its configuration. You have to evaluate the risk of everything it could do.

The time to damage is seconds, not weeks

A rogue SaaS app creates risk over time as data accumulates. A rogue agent creates risk immediately. One prompt that says "export all customer records with email addresses" executes in seconds if the agent has CRM access and no policy blocks the operation.

There is no grace period between discovery and remediation. By the time you find a shadow agent, it may have already accessed sensitive data hundreds of times.

Agents act, they don't just store

Shadow SaaS was primarily a data-at-rest problem: files in the wrong place, records in an unapproved system. Shadow agents are a data-in-motion and action-execution problem. They don't just read data. They call APIs. They trigger workflows. They send messages. They create records.

An unsanctioned agent connected to your ticketing system can create, modify, and close tickets. Connected to your CRM, it can update deal stages and customer records. Connected to your deployment pipeline, it can trigger builds.

The combination of broad access, instant execution, and autonomous action makes shadow agents a fundamentally different threat than shadow SaaS.

The discovery problem: you can't govern what you can't see

Before you can control shadow agents, you have to find them.

MCP servers run locally on endpoints. They are configured in JSON files on the user's machine: ~/.cursor/mcp.json, ~/Library/Application Support/Claude/claude_desktop_config.json, ~/.codeium/windsurf/mcp_config.json. These files are not visible to your SIEM. They don't generate network signatures that your firewall recognizes. They don't appear in your SaaS management platform.

Traditional discovery tools miss them entirely because MCP servers are not applications in the traditional sense. They are configuration-driven connections between AI clients and enterprise systems, running as local processes or remote endpoints.

Discovering shadow agents requires a different approach:

  • Endpoint scanning via EDR or MDM integration to identify MCP config files across all managed devices

  • Network analysis to detect MCP traffic patterns (tool calls to internal APIs from AI client processes)

  • Config file monitoring to track when new MCP servers are added, modified, or shared between users

The output is an agent registry: a centralized inventory of every MCP server, which user configured it, which systems it connects to, and when it was last active.

This registry is the foundation. Without it, every governance policy is guesswork.

What governance looks like when it's done right

The goal is not to stop engineers from using AI. That approach failed with shadow IT and it will fail here. The goal is to give your security team the visibility and controls they need to say yes.

Effective shadow agent governance has four layers:

Layer 1: Discover. Scan endpoints. Find every MCP server. Build the registry. This happens before any policy is enforced. Visibility first, control second.

Layer 2: Classify. Not all shadow agents carry the same risk. An MCP server connected to a public documentation site is different from one connected to your production database. Classify by what systems the agent can reach and what operations it can perform.

Layer 3: Govern. Bring high-risk agents under management. Route their traffic through an MCP gateway that enforces authentication, tool-call-level authorization, and audit logging. Engineers keep their productivity. Security gets the controls.

Layer 4: Prevent. Establish an approved agent registry. New MCP servers are provisioned through governance channels with appropriate access controls from the start. The shadow path becomes unnecessary because the governed path is just as fast.

This is the same maturity model that worked for cloud governance. Discover what's out there. Classify the risk. Bring the risky stuff under control. Make the right path the easy path.

The difference: you have to move faster. Cloud governance played out over years. Agent governance needs to happen in months, because the sprawl is accelerating and the blast radius of each unmanaged agent is larger than any unmanaged SaaS app ever was.

The cost of waiting

Every week without agent discovery, the sprawl grows. More MCP servers. More unaudited connections. More credential exposure. More compliance gaps.

Every enterprise that democratized a past technology wave without governance, whether it was cloud, SaaS, or mobile, is still living with the technical debt. The cleanup cost scales with the delay.

Agents are faster, more capable, and touch more sensitive systems than any previous technology wave. The debt from ungoverned agent sprawl will compound faster than anything that came before.

The organizations that build their agent registry now, that deploy discovery and governance before the sprawl becomes unmanageable, will be the ones that scale AI with confidence. The rest will be the ones writing incident reports and explaining to auditors why hundreds of AI agents had unmonitored access to production systems.

The bottom line

Shadow agents are not shadow IT with a new name. They are a fundamentally more dangerous form of ungoverned technology adoption. They act, not just store. They execute in seconds, not weeks. And they operate with broad access that a SaaS app never had.

The playbook is clear: discover, classify, govern, prevent. The window to execute it before the sprawl becomes unmanageable is shorter than you think.

Start with discovery: see every MCP server in your environment | Book a demo

FAQ

What is a shadow agent?
A shadow agent is any AI agent or MCP server running in your enterprise environment outside of IT and security governance. Typically configured by engineers on their own endpoints, shadow agents connect to enterprise systems using the user's credentials with no centralized oversight, no access controls, and no audit trail.

How many shadow agents does the average enterprise have?
Discovery scans across enterprise environments find an average of 225+ MCP servers per organization, most of them unknown to security teams. This number grows weekly as AI tool adoption accelerates.

How is agent sprawl different from SaaS sprawl?
SaaS sprawl created data-at-rest risk: files in unauthorized locations. Agent sprawl creates data-in-motion and action-execution risk. Agents read databases, call APIs, trigger workflows, and execute commands, all autonomously, all instantly. The blast radius is broader and the time to damage is shorter.

Can we just block MCP to prevent shadow agents?
Blocking MCP blocks your organization's ability to use AI productively. It's the same mistake as blocking cloud adoption in 2012. The engineers who need AI will find workarounds. The better approach is governed access: make the secure path as easy as the shadow path.

What is an AI agent registry?
An agent registry is a centralized inventory of every AI agent and MCP server in your environment. It tracks which user configured each agent, which systems it connects to, what operations it can perform, and when it was last active. The registry is the foundation for agent governance, the same way a SaaS inventory is the foundation for SaaS governance.

1000s

of MCP servers

225+

Shadow AIs detected per org

1.8m

Tool calls per day

Ready to deploy agentic AI
across your enterprise?

SOC2 certified

GDPR compliant

CCPA

US Data Privacy

1000s

of MCP servers

225+

Shadow AIs detected per org

1.8m

Tool calls per day

Ready to deploy agentic AI
across your enterprise?

SOC2 certified

GDPR compliant

CCPA

US Data Privacy

1000s

of MCP servers

225+

Shadow AIs detected per org

1.8m

Tool calls per day

Ready to deploy agentic AI
across your enterprise?

SOC2 certified

GDPR compliant

CCPA

US Data Privacy

Copyright 2026 Natoma Labs, Inc.

Copyright 2026 Natoma Labs, Inc.

Copyright 2026 Natoma Labs, Inc.