Picture this: a production bug strikes at midnight. You jump into your terminal, ready to patch live data, but your platform’s access model opens a full SSH session into the environment. That single connection can touch every file, every secret, every command. No guardrails, no approvals, just raw access.