The perimeter didn't disappear.
It moved.
It moved into the workflow.
And then it was weaponised.
One compromised dependency does not fail locally.
It multiplies.

You asked the agent to help.
You did not authorise that.
The most secure leaders will not be those who move fastest.
They will be the ones who can prove control.