Hi @guidotognini - This is not expected behavior if your colleague truly has only READ and their CLI was using their own identity; deletion requires WRITE/MANAGE on the scope. The most probable explanation is that the CLI call was authenticated as an identity with elevated permissions (either via a misconfigured token/profile or a broader ACL than intended), rather than privilege escalation due to sharing from a personal workspace.
Can you try the following and check the output? Your colleague should have only read permission, as you stated. It might happen that the group your colleague is in, has manage permission on the scope.
databricks secrets get-acl <scope> <principal> or
databricks secrets list-acls <scope>