Threats
20 notes
- Approval Fatigue Exploitation
- Context Poisoning
- Cross-Tenant / Cross-Session Data Leakage
- Data Exfiltration
- Denial of Service
- Goal Manipulation
- Guardrail Bypass
- Hallucination Exploitation
- Misaligned Model Behaviors
- Multi-Agent System Threats
- Persistence Attacks
- Privilege Compromise
- Prompt Injection
- Supply Chain Attack
- System Prompt Extraction
- Tool Misuse
- Tool Output Poisoning
- Training Data Poisoning
- Unauthorized Code Execution
- User Manipulation