- AI applications entered the environment through IDE plugins, browser extensions, and personal credit cards, outside the visibility of SSO and CASB tools.
- Security evaluated each AI tool case by case with no repeatable risk rubric, so the same vendor was reviewed differently by different analysts.
- The API tokens AI agents used to connect to other systems had never been reviewed, and usage-based billing made it impossible to review it



