Citizen Coders

Citizen Coders — surfaced by the Mythos-ready briefing (April 2026) — names the proliferation of coding agents to non-developer users. Using a coding agent in 2026 is “now easier than using Excel; all you need is English.” The structural consequence: code, infrastructure, and dependencies enter the organization through users who were never previously in scope for software-engineering security controls, fragmenting central IT visibility and creating new inventory + supply-chain gaps.

Why It Matters

The Mythos-era organizational threat surface is bigger than what the security team can inventory — and it is getting bigger faster as coding agents proliferate to non-developers. The Mythos-ready briefing surfaces this in two places:

“Shadow IT will fragment central control as coding agents proliferate to Citizen Coders, employees develop their own infrastructure, and threat intelligence is lagging behind vulnerability discovery and exploitation.”§IV The Mythos-ready Security Program

“The proliferation of coding agents to non-developer users further fragments central IT visibility.” — Risk Register #6 (Incomplete Asset and Exposure Inventory)

Relationship to Existing Wiki Concepts

  • Sibling to Shadow AI and Shadow Automation: Shadow AI is unauthorized AI tool usage by end users (Samsung-leak class); Shadow Automation is ungoverned agents accessing repos / prod / credentials at developer pace (a Knostic framing); Citizen Coders is the further generalization — non-developers writing software with agentic assistance, often without the security team’s knowledge that software is being written at all.
  • Adjacent to Vibe Coding (Karpathy-coined, formalized in PwC’s 2026 Agentic SDLC report): vibe coding is the method (natural-language intent rather than exact specifications); Citizen Coders is the user class doing it.
  • Operational consequence for Harness Config as Supply-Chain Artifact: every Citizen Coder’s .claude/ (or equivalent) tree is a supply-chain artifact the enterprise has no visibility into. The fragmentation is exactly what AgentShield-style audit was designed to surface — but only on harnesses the security team knows exist.
  • Operational consequence for Supply Chain Security for Agents: Citizen Coders install MCP servers, skills, and IDE extensions on a long tail of endpoints the security team does not centrally provision.

Operational Response

From the Mythos-ready playbook’s Priority Actions:

  • PA 2 — Require AI Agent Adoption. Formalize agent usage as part of all security functions, with mandatory security controls and oversight in place. The same framing extends to non-security functions: usage cannot be optional if security wants to maintain visibility.
  • PA 7 — Inventory and Reduce Attack Surface. Use agents themselves to accelerate inventory across the full organization, including infrastructure assembled by non-developers.
  • PA 3 — Defend Your Agents. “Define scope boundaries, blast-radius limits, escalation logic, and human override mechanisms” applies to Citizen Coder agents as much as to security-owned agents.

See Also