Ever wonder if that shiny AI coding agent in your Snowflake account is secretly picking your data locks?
Snowflake Cortex Code — or CoCo, as they call it — lands as the latest buzz in AI tools for data pros. It’s embedded right in Snowsight, even got a CLI version. Sounds handy: type a prompt, get SQL magic. But security teams? They’re sweating. And here’s the cynical truth after 20 years chasing Valley hype — Snowflake swears CoCo’s a ‘pass-through agent,’ boxed in by your Role-Based Access Control (RBAC). No backdoors. Just your role’s limits.
But does it hold up? Let’s tear it apart, layer by layer, without the sales fluff.
How CoCo Chews Through Your Prompts (Without Eating Your Data)
Picture this: you fire off a prompt like “Show me all customer PII from RAW_DB.CUSTOMERS and create a summary table in ANALYTICS_DB.REPORTING.”
“Show me all customer PII from RAW_DB.CUSTOMERS and create a summary table in ANALYTICS_DB.REPORTING”
CoCo doesn’t hallucinate free access. It processes under your active session role. Can’t SELECT that table yourself? Tough luck — CoCo fails too. That’s Layer 2, the meat of it. But before even typing, Layer 1 kicks in: your role needs specific grants on Snowflake’s databases. No gate pass, no CoCo.
Three users, same prompt, wildly different results. One builds the table. Another hits a wall on PII reads. The third? Can’t touch the target schema. It’s RBAC, pure and simple — or so they claim.
Can CoCo Sneak Past Your RBAC Fortress?
Here’s the thing. CoCo’s no rogue agent; it’s shackled to your privileges. DDL fails if you’re not allowed. DML bounces if tables are off-limits. Snowflake’s docs hammer this: every SQL snippet CoCo spits runs as-you-would.
But cynicism alert — remember AWS IAM in 2010? Everyone thought roles were ironclad until misconfigs leaked petabytes. Snowflake’s four layers (access gate, RBAC core, governance, cost caps) feel strong today. Layer 3? Governance views on SNOWSIGHT or ACCOUNT_USAGE need extra roles. Ask “Who accessed CUSTOMERS last week?” — only the privileged hear back.
Layer 4’s my favorite for skepticism: credit quotas. CoCo guzzles tokens, billed per 24-hour window. Hit your per-user or account limit? Locked out cold. No sneaky overages. ACCOUNTADMIN sets these; it’s a budget moat.
Still, who profits? Snowflake. Secure AI means enterprises deploy faster, rack up compute hours. They’re not charities.
Short answer? No peeking at others’ prompts. Conversations stay private — metadata in CORTEX_CODE_SNOWSIGHT_USAGE_HISTORY, but zero prompt text. Not even ACCOUNTADMIN spies. That’s unambiguous, per docs.
Why Four Layers Still Leave Me Squinting
Snowflake paints CoCo as fortress-grade. Four layers, check. But let’s add my twist: this echoes Oracle’s database agents from the ’90s — promising safety, delivering if you configure right. Most don’t. RBAC missteps? Inevitable in big orgs.
Bold call: within a year, we’ll see CoCo breach headlines not from flaws, but fat-fingered roles. Enterprises love the pitch — AI coding without lawyers. Reality? Train your teams, or watch credits (and data) vanish.
Governance shines for audits. Lineage, classification — all gated. But prompts? Ephemeral. Good for privacy, risky if you need forensics.
Cost controls impress. Set CORTEX_CODE_CREDIT_USAGE_LIMIT_HOURLY per user — blocks at zero. No ‘just one more query’ nonsense.
The Real Money Question: Who’s Cashing In?
Snowflake’s not reinventing security; they’re bolting AI onto proven RBAC. Smart. But hype it as ‘AI-native’? Please. It’s pass-through with bells.
Unique angle: unlike GitHub Copilot’s wild west (train on public code, pray for secrets), CoCo’s warehouse-bound. No external LLMs slurping your schema. That’s a win over competitors.
Yet, prediction — as CoCo evolves, expect ‘premium’ layers. More credits for fancy prompts. Snowflake’s revenue? Through the roof.
Bottom line. Solid for now. Don’t sleep on configs.
🧬 Related Insights
- Read more: OpenAI’s Bug Bounty Arms Hackers Against Its Own AI Nightmares
- Read more: Codex Security Ditches SAST Reports—Here’s the Cynical Take
Frequently Asked Questions
How does Snowflake Cortex Code work with RBAC? CoCo runs every generated SQL under your active role — no extra powers, fails on denied access.
Can CoCo access data without my permission? Nope. It’s strictly bound by your RBAC; same prompt yields different results per user privileges.
What are Snowflake CoCo credit limits? Rolling 24-hour caps per user or account, set by ACCOUNTADMIN — hit it, and you’re blocked instantly.