What happened with the UNC6395 Salesloft-Drift Supply Chain Attack? 
Learn More

Claude Code has sweeping permissions. Security needs the same visibility.

Claude Code gives developers powerful autonomous capabilities. Obsidian gives security the visibility and controls to govern them.

Shield graphic representing Obsidian SaaS Security Posture Management (SSPM) solution

Why your teams are using Claude Code

Claude Code lets developers move faster: writing, reviewing, and refactoring code autonomously. But every agent operating in your dev environment needs governance to match its capabilities.

Accelerate software delivery

Developers use Claude Code for autonomous coding workflows, cutting time spent on repetitive engineering tasks and speeding up delivery cycles.

Automate complex workflows

Orchestrate multi-step tasks like PR reviews, test generation, dependency updates, and infrastructure changes without manual handoffs between tools or teams.

Expand developer output

Let engineers delegate routine work to Claude Code agents such as debugging, documentation, and code search, so they can focus on higher-complexity problems.

Root access, no guardrails. That’s the problem.

Claude Code agents operate inside your development environment with broad permissions: read/write access to repositories, pipelines, and infrastructure. Without visibility, one misconfiguration or unexpected action can have production-level impact.

Inherited permissions create hidden exposure

Claude Code agents inherit the credentials and permissions of the developer who configured them, often with access to repositories, CI/CD pipelines, and cloud infrastructure that far exceeds what any single workflow requires.

Shadow agents spread without oversight

Developers can spin up Claude Code agents locally or in shared environments without security visibility into what tools they're invoking, what systems they're touching, or what MCP servers they've connected.

Agents execute on all gas, no brakes

Claude Code agents execute autonomously, interacting with connected systems without a human in the loop. Without runtime controls, there's no way to catch a high-risk action before it completes.

MCP tool calls go ungoverned

Claude Code agents invoke MCP-connected tools to interact with backend systems. Without visibility into those tool calls, security teams can't see what's being accessed, modified, or exfiltrated downstream.

Anthropic shows you Claude's capabilities. Security teams need what's behind them.

Claude Code's native controls weren't built for enterprise security. They don't surface the tool calls, MCP connections, and cross-system actions that security teams need to govern a developer agent.

No inventory across your dev environment

Claude Code agents are deployed across engineering teams without a central record of what exists, who owns each one, what MCP servers it's connected to, or what it's executed on.

No single control plane

Anthropic's logs capture model interactions but weren't designed to track tool calls, MCP invocations, or what happens downstream when Claude Code executes inside your development stack.

Over-permissioned agents

Claude Code agents accumulate permissions across every repository, pipeline, and system they touch. Without a unified view of effective access, blast radius is unknown until something breaks.

MCP connections are invisible

Claude Code agents invoke MCP servers to interact with backend systems and services. Without visibility into those connections, unsanctioned MCP usage and downstream risk go completely undetected.

Control every Claude Code agent from a single governance layer

Map, monitor, and manage your agents with a single governance layer. Sign up today to get a demo of our Claude Code capabilities.

sign up for early access

Inventory every Claude Code deployment

You can't govern what you can't see, and in a developer environment, unseen risk moves fast. Obsidian tracks every Claude Code deployment: MCP servers, tools, permissions, and cross-system activity, so your team knows what's running before something breaks.


Key benefits:
  • Shadow AI and auditability: Surface unsanctioned Claude Code deployments — including MCP connections and tool executions — before they become a blind spot you can't explain to auditors.

  • Consolidate every deployment: Map Claude Code risks alongside every other platform in your environment, so governance never fragments by tool or team.

Dashboard showing Salesforce Agentforce agents, their SaaS connections, risks, and owners.
Graph visualization of Salesforce Agentforce agents linked across SaaS apps and workflows.

Block high-risk actions before they execute

When a Claude Code agent takes an action, Obsidian evaluates it in real time with analysis that includes risk factors aligned to OWASP and your security policy. If the action violates policy, it is blocked at execution, not flagged after the fact.


Key benefits:
  • Stop incidents before they start: Enforce guardrails at runtime so executions are prevented, not retroactively reviewed.

  • Govern without friction: Block only what policy prohibits. Legitimate workflows continue uninterrupted.