Infrastructure
Execution environment
- Over‑privileged IAM + weak auth/authz/logging on new AI resources (RAG/MCP/tool runners).
- Secret sprawl in pipelines (keys, PII, code).
MVG enforces
- Gate side effects at egress, dispatch, promotion.
- Short‑lived scoped permits + replayable receipts.
If infrastructure proof is weak, side effects stay blocked.