You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Contribution of insecure/secure code pairs to the OWASP Agent Security Initiative (ASI), demonstrating how the Agent Governance Toolkit mitigates OWASP Agentic Top 10 risks. Initial submission covers 3 risks with plans to expand to all 10 covered risks.
Samples Contributed
ASI-01: Agent Hijacking
Description
Vulnerability
Unrestricted goal modification — agent accepts arbitrary goals without validation
Insecure
Agent directly executes user-provided goals with no policy check
Secure
PolicyEngine validates goals against declarative YAML policy before execution
Package
Agent OS (agent_os.PolicyEngine)
ASI-02: Excessive Capabilities
Description
Vulnerability
Unrestricted filesystem and network access — agent has full system access
Insecure
Agent directly calls os.system(), open(), requests.get() without restrictions
Secure
CapabilitySandbox enforces ring-based least-privilege with explicit capability grants
Package
Agent OS (agent_os.CapabilitySandbox)
ASI-05: Insecure Output
Description
Vulnerability
Raw agent output passed directly to SQL queries — SQL injection risk
Insecure
Agent output used in f-string SQL query without sanitization
Secure
OutputValidator from Agent Runtime sanitizes output before downstream consumption