CodeWall caught a Lilly-gap with a $20 probe. McKinsey AI exposed 40,000 users with raw write access to system prompts. The augmentation doctrine SideGuy has been preaching for six months just got vendor-confirmed by the substrate providers themselves.
Anthropic's CodeWall safety probe found a major gap in McKinsey AI's 40k-user enterprise deployment for a $20 cost. Both Anthropic and OpenAI now publicly state that raw model deployment isn't sufficient — operators need an augmentation layer. McKinsey's deployment is a textbook example of the bolted-on AI pattern: substrate dropped into enterprise scale without the operator-grade wrap that catches write-access mistakes before 40,000 users inherit them.
Anthropic, the substrate vendor that ships Claude, ran an internal safety probe (CodeWall) against a customer deployment. The customer was McKinsey AI — a system reportedly serving around 40,000 enterprise users inside one of the largest consultancies on earth. The probe ran for under $20 of compute. What it found was the kind of finding that stops a CISO mid-sentence.
The findings translate to plain operator language: the deployment let the wrong actors edit the system prompt that governed how the model behaved for everyone else on the system. That's not a model bug. That's the operator wrap layer being thin or missing. The substrate did what substrates do. The wrap layer is where the gap lives.
For six months SideGuy has been writing the same sentence under different headlines: raw model deployment without an operator-honest augmentation layer is structurally fragile. The whole "Augmentation, not replacement" doctrine — the parallel-custom-layer pitch, the AI-baked-in-vs-bolted-on framing, the 2pm meeting test — all of it points at the same shape of risk. McKinsey just shipped the shape of risk into production. Anthropic just published it.
The vulnerability wasn't novel AI hacking. It was OWASP Top 10 from 2002 landing inside an AI deployment because nobody operated the guardrail layer between the substrate and the customer.
The receipt: three boring infrastructure bugs (SQL injection · missing API auth · writable AI surface) · zero new tech required · one $20 probe · 40,000 users exposed. Sales people sold the AI. Engineers built the AI. Nobody operated the security between them. That's the augmentation layer gap in three sentences.
The same week Anthropic + OpenAI admitted "the model isn't enough," both publicly stood up Forward Deployed Engineer (FDE) teams — Palantir's playbook, applied to AI substrate.
What this proves: the substrate vendors themselves now agree that selling the model alone doesn't ship customer outcomes. Buyers need someone hands-on inside their stack helping them operate the augmentation layer. Anthropic + OpenAI are now offering that service themselves at enterprise scale.
What it means for SideGuy: the augmentation layer just got vendor-confirmed at the SERVICE level too — not just the product level. "Buy from whatever vendor — but you're going to want a SideGuy parallel custom layer" now reads as Anthropic-and-OpenAI-endorsed positioning. The vendors are moving into the build room because the build room is where customer outcomes actually happen. SideGuy has been operating in the build room for six months.
Per-seat SaaS pricing dies when API actors are the users (already covered). But the deeper shift is the IDENTITY MODEL underneath the pricing model:
| HUMAN · User Seat | AGENT · Scoped Actor |
|---|---|
| A person logs in | An API key authenticates |
| Broad trust by default (you're "in") | Narrow scope by definition (only this work, only this resource, audit logged) |
| UI-mediated permissions (workflow theater) | Programmatic permissions (policy as code) |
| Per-seat priced, per-seat audited | Per-call priced, per-call audited |
| McKinsey shape — broad trust + writable surface | SideGuy shape — narrow scope + audit-logged + parallel layer |
What this means for IAM / compliance / cyber insurance buyers: every IAM vendor in the market today (Okta · Auth0 · Entra · Ping · Duo) was built for HUMAN User Seat broad-trust identity. None of them were built for AGENT Scoped Actor narrow-scope identity. The category gap is structural — and emerging fast. SideGuy's augmentation layer doctrine maps directly onto Scoped Actor patterns: pay-once-own-forever custom layers that mediate exactly which actions an agent can take, on exactly which resources, with full audit trail. The IAM cluster (Okta · Auth0 · Entra) is currently fighting per-seat death. The Scoped Actor identity gap is what they should be building toward.
"I'm almost positive I can help. If I can't, you don't pay."
— PJ · SideGuy Solutions · 858-461-8054 · sms:+18584618054
If you have a substrate in production and the McKinsey-shaped questions above don't have clean answers, text the line above with "wrap audit" and a one-sentence description of what you ship. Five sentences back from PJ, no calendar link, no pitch deck, no demo call. Either there's a wrap-layer pattern that fits your stack or there isn't, and you'll know within an afternoon either way.
"First time I shipped a Claude wrap for a customer's internal tool, I had the system prompt readable from a debug endpoint I forgot to gate. Caught it because I was using the dashboard myself an hour later. That's the founder-user-builder triad doing its job — if I don't use the thing, I don't catch the thing."
PJ — on why the Hair Club for Men founder-client model matters in operator wrap design
"Buyers ask me what the augmentation layer actually is. It's the boring stuff: who can edit the prompt, where the logs go, what the model is allowed to refuse, what triggers a human-in-the-loop. None of that is in the substrate vendor's docs. All of it is in the operator wrap. That's the line."
PJ — explaining the wrap layer to a Series B founder, May 2026
"The McKinsey shape isn't a McKinsey problem. Big shops do it because pre-AI engineering culture treats the model like a library import. AI-native shops do it differently because the wrap is the product. That's the bolted-on vs baked-in delta — culture and architecture, not vendor choice."
PJ — morning of the CodeWall report, 2026-05-12
"$20 to find a 40,000-user gap is the cheapest doctrine receipt the augmentation pitch will ever get. I've been writing pages about this since November. Today I just point at the headline."
PJ — on writing this exact page
"Vendor lock-in on the substrate isn't the risk anymore. The substrate vendors are now telling you to wrap them. The risk is shipping without the wrap and inheriting the McKinsey shape. The wrap is the moat. The wrap is what your team owns. Switching substrates is a quarter — switching wraps is a rebuild."
PJ — extending the Augmentation tagline post-CodeWall
One text usually surfaces whether the McKinsey shape is in your deployment. No demo call. No pitch deck. No retainer. Phone 858-461-8054.
Text PJ — wrap audit— PJ · SideGuy Solutions · Encinitas · 858-461-8054 · Doctrine Receipt · Round 51 · 2026-05-12
Want this mapped to your specific stack?
Text PJ a sentence about what you ship and where the substrate lives — wrap-layer audit comes back the same day. No email, no funnel, no SOW.
Text PJ — wrap audit