Skip to main content

We use cookies to enhance your experience. By continuing to visit this site you agree to our use of cookies. Cookie Policy

AI in ASIA
Life

How AI Agents Will Break Passkeys And 3 Ways To Fix Them

AI agents can't use biometric authentication, forcing enterprises to proxy human credentials and creating massive security vulnerabilities in passkey systems.

Intelligence DeskIntelligence Desk8 min read

AI Snapshot

The TL;DR: what matters, fast.

AI agents cannot use biometric authentication, forcing enterprises to proxy human credentials

Passkey adoption grew in Asia but wasn't designed for autonomous machine authentication

Credential proxying creates security vulnerabilities that undermine passkey protection benefits

The Authentication Crisis: Why AI Agents Are Breaking Passkeys

Passkeys were built to secure humans, not machines. As Asia's enterprises wire AI into daily operations, a new kind of identity crisis is emerging that threatens to undo years of security progress.

The promise was simple: eliminate phishing by replacing passwords with cryptographic credentials stored on your device. Apple, Google, and Microsoft have spent years coaxing the world toward this vision. Banks in Singapore and Hong Kong now encourage customers to use them. Retailers across Australia and Japan deploy them to reduce checkout fraud.

But beneath that success lies a fundamental design flaw. Passkeys authenticate humans through biometrics and device-specific keys. They were not designed for autonomous AI agents that operate on behalf of those humans.

Advertisement

How Passkeys Work (and Why They Excel for Humans)

For all their marketing jargon, passkeys are elegant. Instead of a shared secret that can be stolen, they use asymmetric cryptography. Your private key never leaves your device; the server only ever sees your public key. That means there's nothing for a phisher to trick you into giving away.

The system replaces brittle passwords with a pair of keys secured by your fingerprint or face. They solve two long-standing headaches: proving you are you and ensuring that websites are who they claim to be.

The trade-off, however, is dependency. Passkeys tie your identity to a single device or cloud service. Lose the device, and recovery depends on whatever backup policy your provider enforces. In Apple's case, that's iCloud with two-factor authentication.

By The Numbers

  • Only 1% of websites fully implement OAuth's fine-grained permissions system
  • Phishing attacks decreased by 99% for users adopting passkeys according to Google's 2024 security report
  • Enterprise AI agent deployments in APAC grew 340% in 2024, with most using proxied human credentials
  • Average data breach costs in Asia reached $4.88 million in 2024, with credential compromise as the leading attack vector
  • Singapore's fintech sector reported a 67% increase in AI agent usage for transaction processing in 2024

Where AI Agents Shatter the Authentication Model

Here's the critical issue: an AI agent cannot press its thumb against a fingerprint reader or scan its face with Face ID. It cannot live inside iCloud. It cannot authenticate via a smartphone.

So, if you want your AI agent to approve a purchase order, reconcile invoices, or fetch HR data, it needs access. The only way to give it that access today is by proxying your credentials.

That's like handing your house keys to a cleaning robot and telling it to make copies "just in case." Convenient, yes. Secure, absolutely not.

"We're seeing enterprises rush to deploy AI agents using human credentials as a shortcut. It's creating massive security blind spots that most organisations don't even recognise yet," says Dr Sarah Chen, Chief Security Officer at CyberEdge Solutions in Singapore.

OAuth, the protocol that powers delegated logins, does technically allow fine-grained permissions. But adoption remains vanishingly low, and human behaviour is rarely tidy. Faced with friction, people override controls. We've seen this movie before, with sticky notes full of passwords taped to monitors.

The Over-Permission Problem

Once an AI agent holds human credentials, it inherits everything. If a CFO's passkey grants access to the entire finance stack, so too does the agent. The result: over-permissioned AI that can move data, approve transactions, or replicate itself faster than any human could.

The danger multiplies when these agents spawn sub-agents or when attackers create impostor agents that mimic legitimate ones. Suddenly, the tidy promise of passwordless security devolves into chaos at machine speed.

For Asia's enterprises, the implications cascade across three critical areas:

  • Operational risk: AI agents working with expired or duplicated credentials can trigger system-wide outages
  • Compliance risk: Regulators in Singapore and Japan require clear audit trails, but agent actions under human credentials blur accountability
  • Security risk: Over-permissioned agents become irresistible targets for attackers seeking to inherit human privileges
  • Scale risk: Unlike humans, compromised agents can act simultaneously across hundreds of systems
"The traditional security model assumes one person, one identity, one set of actions. AI agents break all three assumptions simultaneously," explains Marcus Kim, Head of Identity and Access Management at Seoul National Bank.

Three Strategic Fixes for the AI Authentication Crisis

The solution isn't to abandon passkeys but to extend them beyond human-centric design. Three approaches can future-proof authentication for the AI agent era:

1. Agent-Specific Identities Each AI agent must have its own cryptographic identity, distinct from the human it represents. Think of it as a digital passport with limited permissions, renewable and revocable. This creates accountability without compromising human credentials.

2. Intent-Based Authorisation Access decisions should depend on what an agent is doing, not just who it represents. If an AI is generating an invoice summary, it should never be able to access payroll data. Context-aware permissions prevent privilege creep.

3. Stronger Governance and Observability Businesses must treat AI agents as first-class digital actors, subject to the same monitoring, revocation, and audit policies as employees. Real-time credential mapping becomes essential as regulators tighten data governance rules.

Authentication Model Human Users AI Agents (Current) AI Agents (Proposed)
Identity Method Biometric + Device Proxied Human Credentials Unique Cryptographic Identity
Permission Scope Role-Based Inherited Full Access Intent-Based Limits
Audit Trail Clear Blurred Distinct Agent Actions
Revocation Speed Immediate Delayed/Manual Automated + Real-Time

How do AI agents currently access enterprise systems?

Most AI agents today use proxied human credentials, inheriting full user permissions. This creates security blind spots and compliance issues since actions cannot be distinctly attributed to the agent versus the human user.

Can existing OAuth protocols handle AI agent authentication?

OAuth technically supports fine-grained permissions, but only 1% of websites implement it fully. Even when available, most organisations default to broad permissions for simplicity, recreating the over-permission problem.

What regulatory challenges do AI agents create for authentication?

Regulators in Singapore and Japan require clear audit trails for financial transactions. When AI agents act under human credentials, it becomes impossible to determine who or what initiated specific actions, creating compliance gaps.

How fast can compromised AI agents cause damage compared to human attackers?

AI agents can operate simultaneously across hundreds of systems at machine speed. A compromised agent with broad permissions could exfiltrate data or execute transactions faster than any human attacker or security response team.

What's the timeline for implementing agent-specific authentication systems?

Industry experts estimate 18-24 months for new standards to emerge, with another 2-3 years for widespread enterprise adoption. Early movers are already piloting custom solutions for high-risk environments.

The AIinASIA View: Passkeys represent the right direction for human security, but enterprises rushing to deploy AI agents are inadvertently creating new attack vectors. The current approach of proxying human credentials is a dangerous shortcut that undermines the security gains passkeys were meant to deliver. Asia's rapid AI adoption makes this region particularly vulnerable to authentication-related breaches. We believe the fix requires industry-wide collaboration on agent-specific identity standards, not incremental patches to human-centric systems. The question isn't whether this authentication crisis will hit Asian enterprises, but whether they'll prepare for it before or after the first major breach.

The Race Against AI-Speed Threats

Passkeys were a triumph of simplicity, the rare example of security that made life easier for users. But the rise of AI agents challenges their fundamental assumption: that every user is human.

In Asia's rapidly automating markets, from fintech in Singapore to logistics in South Korea, that assumption is already outdated. The question now is not whether passkeys are secure, but whether they can evolve quickly enough to handle non-human identities before AI turns convenience into catastrophe.

As the region races to integrate AI into business infrastructure, the new security mantra shouldn't be "stop using passwords." It should be "start rethinking identity for the age of artificial intelligence."

What's your take on AI agents and authentication security? Are enterprises moving too fast without considering the risks, or is this just another security challenge that innovation will solve? Drop your take in the comments below.

YOUR TAKE

We cover the story. You tell us what it means on the ground.

What did you think?

Share your thoughts

Join 7 readers in the discussion below

This is a developing story

We're tracking this across Asia-Pacific and may update with new developments, follow-ups and regional context.

Advertisement

Advertisement

This article is part of the This Week in Asian AI learning path.

Continue the path →

Latest Comments (7)

Zhang Yue
Zhang Yue@zhangy
AI
31 October 2025

i see the point about passkeys being device-dependent for recovery. in china, many users might be more inclined to trust a domestic cloud solution for key backup, perhaps integrating with WeChat or Alipay ecosystems, similar to how Qwen-VL or DeepSeek models are often fine-tuned on diverse Chinese datasets for better local performance. this local context for identity recovery seems crucial.

AIinASIA fan
AIinASIA fan@loyal_reader
AI
30 October 2025

you guys talked about the iCloud dependency for passkeys a while back too! good to see that angle woven into the AI problem. it's always the recovery part that trips people up.

Carlo Ramos
Carlo Ramos@carlor
AI
26 October 2025

@carlor: "the gap could turn into a chasm" - that's the part that gets me. if AI agents need their own identities, and they're doing tasks humans used to do, are we just creating more work for AI to manage so companies don't have to hire people? as someone who does this for a living, it feels like another way to push out human labor.

Rohan Kumar
Rohan Kumar@rohank
AI
22 October 2025

Totally agree that passkeys are great for humans! We've seen it with clients trying to integrate AI agents into their existing systems. One e-commerce client in Bangalore, their customer service agents were bogged down with password resets. We tried passkeys but then the AI bots couldn't access anything. Big bottleneck. This whole "agent-specific identities" idea? That's the way to go, opens up so many possibilities!

Natalie Okafor@natalieok
AI
20 October 2025

the dependency on a single device or cloud for passkeys is a real vulnerability, especially in healthcare. imagine a clinician losing their device mid-shift, and the recovery process impacting patient care or data access regulatory compliance.

Benjamin Ng
Benjamin Ng@benng
AI
15 October 2025

the part about passkeys tying identity to a device or cloud really resonates. we're building LLM tutors and thinking about multi-device access for students. if a passkey is locked to their phone and they switch to a laptop, that's a user friction point. gotta figure out that recovery flow without compromising security for the agents too.

Marie Laurent
Marie Laurent@marielaurent
AI
10 October 2025

this is precisely what we're grappling with in europe, especially as we look to integrate AI more deeply into clienteling and design. the "device dependency" of passkeys for human users already poses a challenge for our luxury clients who frequently travel and use multiple devices. how do we even begin to secure an AI agent's credentials across a global operation then?

Leave a Comment

Your email will not be published