Find out in under 4 minutes whether AI agents are running on governed identities or hidden OAuth grants.
This is a governance visibility screen for AI-agent identities and OAuth-connected access paths. It is not an IAM platform, browser extension, or grant-monitoring product.
This screen classifies identity and OAuth exposure fast. It does not enumerate grants, export an inventory, or replace IAM tooling.
Use this to classify whether AI-agent identities and OAuth grants are visibly governed, partially governed, materially exposed, or effectively unmanaged.
This section classify identity and grant exposure quickly, surface the most significant visibility gaps, and recommend an appropriate implementation path.
This assessment evaluates whether AI-agent access is visible, attributable, governable, and revocable across inventories, grants, scopes, ownership, discovery, and policy coverage.
A green result does not prove hidden grants are impossible. It means the current posture looks more governable than the other states and still needs discipline to stay that way.
Green and amber results usually need structured inventory, gap analysis, and dashboards first, which sit in AI Controls Starter. Severe red states need policy, evidence, incident, and implementation assets, which sit in AI Controls Professional.
Use the workbook bridge when the problem is visibility and cleanup. Use the implementation bridge when the result shows structural policy, ownership, incident, or evidence failures.
Structure the inventory, gap analysis, and dashboard baseline for agent identities and OAuth access.
Move to the full policy, incident, evidence, and implementation layer when the result is materially exposed or blind.
Use the broader shadow-AI screen when the problem extends beyond identities and OAuth grants.
It evaluates inventory coverage, identity model, OAuth grant visibility, scope discipline, revocation readiness, attribution quality, ownership, policy coverage, and discovery discipline for AI-agent access paths.
No. It means the current posture appears more governable than the other states. Hidden grants can still emerge if discovery, recertification, or ownership discipline weakens.
Because hidden OAuth access becomes materially harder to contain when nobody clearly owns the agent or grant and the organization cannot revoke access quickly during an incident.
Earlier-maturity results usually need visibility, inventory, and gap analysis first, which sit in AI Controls Starter. Severe red states need policy, incident, evidence, and implementation controls, which sit in AI Controls Professional.
No. The assessment runs entirely in the browser. Answers are not stored, synced, or submitted to a server.
Source and review note: This page was last reviewed on 6 May 2026 against the current Move78 public site baseline and relevant official or authoritative sources where laws, standards, frameworks, cybersecurity controls, product scope, pricing, support policy, or implementation guidance are discussed. It provides operational implementation guidance and product information only; it is not legal advice, tax advice, audit assurance, certification assurance, conformity-assessment advice, buyer-approval assurance, or security assurance. Validate legal, regulatory, contractual, tax, audit, and security decisions with qualified professionals.