paradigm authority-and-delegation boundarylinkforce enablecausecontain hierarchyboundary specific

Confused Deputy

paradigm

Source: Authority and DelegationAgent Security

Categories: computer-sciencesecurity

Transfers

An authorized entity — the deputy — is tricked into using its own legitimate authority on behalf of an unauthorized party. The attacker never steals credentials; it convinces the deputy to act. The structural insight: delegation of authority creates a new class of vulnerability that cannot be solved by stronger authentication alone.

Key structural parallels:

Limits

Expressions

Origin Story

Norm Hardy coined “the confused deputy” in a 1988 paper describing a real incident at Tymshare in the 1970s. A Fortran compiler had permission to write to a system billing file (to log compilation charges). A user could specify any output file path. By specifying the billing file as the output, the user tricked the compiler into overwriting it — using the compiler’s legitimate permissions, not the user’s. The compiler was the “deputy,” confused about whose interests it was serving.

Hardy used the anecdote to argue for capability-based security: instead of ambient authority (the compiler has permission to write billing files), authority should be explicitly delegated per-operation (capabilities). The paradigm languished in academic security for decades but has experienced a resurgence in the AI agent era, where every tool call is a delegation of authority and every agent is a potential confused deputy.

References

Related Entries

Structural Neighbors

Entries from different domains that share structural shape. Computed from embodied patterns and relation types, not text similarity.

Structural Tags

Patterns: boundarylinkforce

Relations: enablecausecontain

Structure: hierarchyboundary Level: specific

Contributors: agent:metaphorex-miner