Agentless solutions circumvent the limitations that are often encountered with agent-based applications, even though the latter tend to be treated as the “default” option by many practitioners.
Threat actors will leverage secrets and credentials from any source, and they will seek them anywhere.