Anthropic isolates agent credentials from execution to unlock enterprise deployment

Anthropic has released two new security capabilities for Claude Managed Agents that address a critical enterprise deployment bottleneck: credential exposure. Self-hosted sandboxes, now in public beta, let enterprises run tool execution on their own infrastructure rather than on Anthropic's servers, while MCP tunnels, in research preview, connect agents to private servers without exposing credentials in the agent's context. Together, these features move authentication control to the network boundary instead of embedding it in the agent itself, reducing the blast radius if an agent is compromised or misbehaves.
TL;DR
- →Anthropic released self-hosted sandboxes (public beta) and MCP tunnels (research preview) for Claude Managed Agents to isolate credential handling from agent execution
- →Self-hosted sandboxes run tool execution on enterprise infrastructure while keeping the agent orchestration loop on Anthropic's platform, creating a security boundary
- →MCP tunnels enable agents to reach private servers through lightweight outbound-only gateways without credentials passing through the agent itself
- →The split architecture differs from OpenAI's local execution approach by separating agent orchestration from tool execution, changing the threat model rather than just the deployment model
Why it matters
Credential exposure has been a major blocker for enterprise AI agent adoption. Most production deployments embed authentication tokens directly in agents, meaning a compromised or misbehaving agent becomes a vector for internal system compromise. Anthropic's architectural approach, which separates orchestration from execution, addresses this at the infrastructure level rather than relying on agent-level safeguards alone, setting a new baseline for how enterprise AI systems should handle sensitive access.
Business relevance
For operators and founders building AI-driven workflows, these capabilities unlock use cases that were previously too risky for production deployment. Enterprises can now connect agents to internal APIs and databases without accepting unacceptable security tradeoffs, reducing friction in sales cycles and enabling broader automation of business-critical processes. The ability to keep credentials off the agent itself also simplifies compliance and audit requirements.
Key implications
- →Credential management is shifting from an application-layer problem to an infrastructure-layer problem, requiring orchestration teams to think about network topology and access control boundaries differently
- →The split architecture creates a new technical differentiator in the agent platform market, with implications for how teams evaluate and compare solutions from different providers
- →Enterprises will need to map their internal API and database access patterns to determine whether sandboxes or MCP tunnels are appropriate for each workflow, adding a new dimension to agent deployment planning
What to watch
Monitor how quickly enterprises adopt self-hosted sandboxes and whether MCP tunnels graduate from research preview to production. Watch for competitive responses from OpenAI and other model providers, particularly whether they adopt similar split architectures or pursue alternative approaches to credential isolation. Also track whether orchestration platforms and integration tools build native support for these patterns, as adoption will likely depend on tooling maturity.
vff Briefing
Weekly signal. No noise. Built for founders, operators, and AI-curious professionals.
No spam. Unsubscribe any time.



