Picture this. Your coding assistant fires off a command that spins up a new container, hits production credentials, and dumps logs into an LLM prompt. It feels magical, until someone realizes that “magic” just exposed secrets, configuration data, and half your compliance posture. AI for infrastructure access and AI secrets