CONCEPT Cited by 2 sources
Coding-agent sprawl¶
Coding-agent sprawl is the named problem class of an engineering organisation simultaneously running multiple parallel coding-agent tools (Cursor, Claude Code, Codex CLI, Gemini CLI, Windsurf, OpenCode, …) — each with its own model choices, API keys, cost centre, audit log, SSO surface, and MCP integrations.
Definition (from the 2026-04-17 Databricks post)¶
Databricks names the shape directly: "within Databricks, our software developers flexibly mix usage between Cursor, Codex, Claude Code, and others — often using multiple tools at the same time" and declares it a "business necessity", not a temporary anomaly. The architectural implication is that coding-agent polyglotism is permanent and infrastructure must be designed assuming N coding tools per developer for unbounded N.
Three sub-problems the post enumerates¶
- Security risk — MCP tool surfaces, "most useful when they have access to critical data within your organization", accidentally make each new agent "the most privileged developer in your organization". Without centralised governance, each new tool is a separate security-review load and a separate data-access policy surface.
- Cost explosion — "agent costs are becoming a top R&D cost driver". New frontier models ship weekly ("Opus 4.6, Composer 2, GPT-5.4, Kimi-2.5, Gemini 3 Pro" — notional future models listed in the post); budget guardrails per tool is an admin-tab-switching nightmare.
- Visibility gap — "executives lack visibility into tool adoption". With every team on a different tool, central adoption / velocity measurement is impossible without cross- tool telemetry aggregation.
Why each tool on its own can't fix it¶
By construction: each coding tool is a competitor — Cursor won't ingest Anthropic's telemetry, Claude Code won't defer to Cursor's quota system, Codex won't use Gemini's identity plane. Governance has to live above the tools, not inside them. That's the structural case for the AI-gateway pattern being specialised for coding-agent clients (systems/unity-ai-gateway).
Parallel instance in other ingested posts¶
- Cloudflare internal AI engineering stack
(sources/2026-04-20-cloudflare-internal-ai-engineering-stack)
— same problem class, different substrates. Cloudflare solved
it by building a single proxy Worker in front of AI Gateway
that all tools (OpenCode, Windsurf, Claude Code, internal
agents, Code Reviewer) authenticate to via
.well-knowndiscovery. Key-per-client replaced by Zero-Trust Access JWT; per-user UUID tagging for anonymous cost attribution;opencode auth loginbootstrap.
Both instances converge on the same three-pillar governance shape: centralised auth + single bill + unified observability. See concepts/centralized-ai-governance.
Why the problem is architecturally substantive¶
On the surface it looks like a procurement / vendor-management issue. Two properties make it structural:
- Write access: coding tools don't just suggest; they edit source, open PRs, run CI, call MCP servers that read tickets
- design docs + customer issues. The governance surface is non-trivially end-to-end.
- Rate of change: coding tools + underlying models evolve in weeks, not years. Any governance architecture that bolts onto specific tools is obsolete at tool-adoption speed. The gateway pattern is durable because it abstracts over the tool axis.
Seen in¶
- sources/2026-04-17-databricks-governing-coding-agent-sprawl-with-unity-ai-gateway — coined the term, names the three sub-problems, proposes Unity AI Gateway as the answer.
- sources/2026-04-20-cloudflare-internal-ai-engineering-stack — doesn't use the term but documents the same shape with different substrates (OpenCode / Windsurf / Claude Code / many internal agents fronted by one Hono Worker + AI Gateway).
Related¶
- concepts/centralized-ai-governance — the three-pillar governance answer.
- patterns/ai-gateway-provider-abstraction — the underlying pattern being specialised.
- patterns/central-proxy-choke-point — architectural posture.
- systems/unity-ai-gateway — Databricks instance.
- concepts/byok-bring-your-own-key — secrets posture that pairs with gateway-as-choke-point.