Choose: Leash
- Rationale: Container alone cannot prevent exfiltration or tool misuse when network is open. Leash adds policy enforcement (Cedar), MCP authorization/monitoring, and runtime observability—the control layer you actually need.
- Trade-off: Additional tooling complexity; depends on StrongDM/Leash maturity and Cedar policy learning curve.