defense 2025

MiniScope: A Least Privilege Framework for Authorizing Tool Calling Agents

Jinhao Zhu 1, Kevin Tseng 1, Gil Vernik 2, Xiao Huang 1, Shishir G. Patil 1, Vivian Fang , Raluca Ada Popa 1

4 citations · 87 references · arXiv

α

Published on arXiv

2512.11147

Insecure Plugin Design

OWASP LLM Top 10 — LLM07

Excessive Agency

OWASP LLM Top 10 — LLM08

Key Finding

MiniScope incurs only 1–6% latency overhead compared to vanilla tool-calling agents while significantly outperforming LLM-based baselines in minimizing permissions and reducing computational and operational costs.

MiniScope

Novel technique introduced


Tool calling agents are an emerging paradigm in LLM deployment, with major platforms such as ChatGPT, Claude, and Gemini adding connectors and autonomous capabilities. However, the inherent unreliability of LLMs introduces fundamental security risks when these agents operate over sensitive user services. Prior approaches either rely on manually written policies that require security expertise, or place LLMs in the confinement loop, which lacks rigorous security guarantees. We present MiniScope, a framework that enables tool calling agents to operate on user accounts while confining potential damage from unreliable LLMs. MiniScope introduces a novel way to automatically and rigorously enforce least privilege principles by reconstructing permission hierarchies that reflect relationships among tool calls and combining them with a mobile-style permission model to balance security and ease of use. To evaluate MiniScope, we create a synthetic dataset derived from ten popular real-world applications, capturing the complexity of realistic agentic tasks beyond existing simplified benchmarks. Our evaluation shows that MiniScope incurs only 1-6% latency overhead compared to vanilla tool calling agents, while significantly outperforming the LLM based baseline in minimizing permissions as well as computational and operational costs.


Key Contributions

  • Automatic reconstruction of permission hierarchies that reflect relationships among tool calls, enabling rigorous least privilege enforcement without manual policy writing
  • A mobile-style permission model adapted for LLM agents that balances security and usability
  • A synthetic evaluation dataset derived from ten real-world applications capturing realistic agentic task complexity beyond existing benchmarks

🛡️ Threat Analysis


Details

Domains
nlp
Model Types
llm
Threat Tags
inference_time
Datasets
Synthetic dataset from ten real-world applications (custom)
Applications
llm tool-calling agentschatgpt/claude/gemini connectorsagentic systems over user accounts