The OWASP Top 10 for Agentic Applications (2026) focuses specifically on AI agent threats: tool abuse, inter-agent attacks, rogue behavior. This is closer to Pipelock’s core than the LLM Top 10, which includes model-level concerns.
Pipelock covers all 10. Three strong, three moderate, four partial.
Coverage at a glance
| # | Threat | Coverage |
|---|---|---|
| ASI01 | Agent Goal Hijack | Strong |
| ASI02 | Tool Misuse | Partial |
| ASI03 | Identity & Privilege Abuse | Strong |
| ASI04 | Supply Chain Vulnerabilities | Partial |
| ASI05 | Unexpected Code Execution | Moderate |
| ASI06 | Memory & Context Poisoning | Moderate |
| ASI07 | Insecure Inter-Agent Communication | Partial |
| ASI08 | Cascading Failures | Moderate |
| ASI09 | Human-Agent Trust Exploitation | Partial |
| ASI10 | Rogue Agents | Strong |
ASI01: Agent Goal Hijack (Strong)
Attackers redirect agent objectives through malicious text in external data: web pages, tool results, documents.
Pipelock scans every content entry point:
- Response scanning checks fetched web content for injection patterns before the agent reads it. Actions:
block,strip,warn, orask. - MCP response scanning wraps MCP servers and scans JSON-RPC tool results. Text is concatenated across content blocks, catching injection split across multiple blocks.
- MCP input scanning checks tool arguments on the request path. Catches injection payloads being sent to tools.
- Pattern matching detects “ignore previous instructions,” system/role overrides, jailbreak templates (DAN, developer mode), and multi-language variants.
Gap: Regex-based detection can miss novel patterns. Classifier-based detection is on the roadmap.
ASI02: Tool Misuse (Partial)
Agents misuse legitimate tools due to prompt injection, misalignment, or unsafe delegation. Tools get called with destructive parameters or chained in unexpected ways.
Pipelock controls the network tool and scans MCP traffic:
- Fetch proxy as controlled tool: the agent’s only network access is through the proxy, which runs every request through the full scanner pipeline.
- MCP response scanning catches injection payloads in tool results.
- MCP input scanning catches DLP leaks and injection in tool arguments.
- MCP tool scanning detects poisoned tool descriptions and rug-pull definition changes.
Containment: Pipelock controls the HTTP fetch tool and scans MCP traffic bidirectionally. pipelock sandbox adds Landlock, seccomp, and network namespace isolation on Linux, and sandbox-exec profiles on macOS (alpha). On Windows, pair with agentsh or Anthropic srt.
ASI03: Identity & Privilege Abuse (Strong)
Attackers exploit inherited credentials, delegated permissions, or agent-to-agent trust to access resources beyond intended scope.
- Capability separation: the agent (holds secrets, no network) and the proxy (has network, no secrets) are separate processes. Deployment enforces the boundary.
- Domain allowlisting: agents only reach explicitly allowed endpoints.
- SSRF protection: blocks private IP ranges, cloud metadata, loopback, and link-local addresses. DNS rebinding prevention validates resolved IPs before connecting.
- Docker Compose isolation:
pipelock generate docker-composecreates a network topology where the agent container has no direct internet access.
ASI04: Supply Chain Vulnerabilities (Partial)
Malicious or tampered tools, skill packages, models, or agent personas compromise execution.
- Workspace integrity monitoring: SHA256 manifests detect file modifications, additions, or removals. A compromised skill that modifies config files is caught.
- MCP response scanning catches compromised MCP servers injecting payloads into tool results.
- MCP tool scanning detects poisoned tool descriptions and rug-pull changes mid-session.
- Ed25519 signing for tamper-evident file verification.
Gap: No dependency scanning or model identity verification. Use Trivy or Dependabot.
ASI05: Unexpected Code Execution (Moderate)
Agents generate or execute attacker-controlled code through manipulated tool outputs.
- MCP proxy scanning catches injection payloads in tool results before the agent processes them.
- Content extraction strips scripts, styles, and executable content from fetched HTML.
- DLP scanning detects API key formats in URLs and request bodies, catching code execution results that leak secrets.
Containment: Pipelock limits the blast radius by blocking exfiltration. pipelock sandbox also restricts code execution at the OS level (Linux: Landlock + seccomp + netns; macOS: sandbox-exec, alpha).
ASI06: Memory & Context Poisoning (Moderate)
Attackers corrupt the data sources an agent relies on for knowledge and decisions.
- Response scanning checks fetched web content (the most common knowledge source for coding agents) for injection.
- Content extraction strips non-content elements from fetched pages.
- Workspace integrity monitoring detects unauthorized modifications to memory files, config files, and other workspace data the agent reads.
Gap: No semantic analysis of retrieved content. Pipelock detects pattern-based injection, not subtly misleading information.
ASI07: Insecure Inter-Agent Communication (Partial)
Agents in a multi-agent system attack each other through shared resources, message passing, or lateral movement through workspace files.
- Multi-agent identification: each agent gets a named profile with independent mode, allowlist, DLP, rate limits, and budget. Identity resolution via listener binding (spoof-proof),
X-Pipelock-Agentheader, or?agent=query param. - File integrity monitoring detects unauthorized workspace modifications. An agent that tampers with shared handoff files is caught.
- Ed25519 signing for cryptographic verification of shared data.
- MCP confused deputy protection: response ID validation prevents malicious MCP servers from injecting unsolicited JSON-RPC responses.
Gap: No runtime inter-agent communication policy yet.
ASI08: Cascading Failures (Moderate)
Failures propagate through agent chains. One agent’s error or compromise triggers failures downstream.
- Per-domain rate limiting prevents bulk requests from overwhelming external services.
- Response size limits (
max_response_mb) prevent memory exhaustion. - Request timeouts prevent hanging connections that block agent pipelines.
- Structured logging with zerolog enables rapid diagnosis of failure chains.
Gap: No circuit-breaker pattern or agent-level health checks yet.
ASI09: Human-Agent Trust Exploitation (Partial)
Attackers exploit the trust humans place in agent outputs, using agents as intermediaries to deliver manipulated content or unauthorized actions.
- HITL terminal approval:
action: askprompts the human operator with a y/N/s dialog when suspicious content is detected. - Audit logging gives humans a verifiable record of every agent request and scanner detection.
- Prometheus metrics surface block rates, scanner hits, and top domains for oversight dashboards.
Gap: No user-facing UI for non-terminal environments. HITL is terminal-only.
ASI10: Rogue Agents (Strong)
Agents act outside their intended boundaries due to compromised objectives, misalignment, or adversarial manipulation.
This is where Pipelock’s architecture pays off:
- Principle of least privilege: agents only reach allowed API domains.
- Capability separation: agents can’t bypass the proxy to reach the internet directly.
- Configurable enforcement modes: strict (block on detection), balanced (warn on detection), audit (detect and log).
- Domain blocklist: known exfiltration targets blocked by default.
- Rate limiting: per-domain sliding window prevents bulk data transfer even to allowed domains.
- Environment variable leak detection: catches env var values in outbound traffic.
- Entropy analysis: flags high-entropy strings that look like encoded secrets.
The three OWASP frameworks
- Top 10 for LLM Applications (2025): model and application risks. 7/10 covered.
- Top 10 for Agentic Applications (ASI01-ASI10): this page. Agent-specific risks. 10/10 covered.
- Agentic AI Threats and Mitigations (T1-T15): broadest framework, 15 threats. 12/15 covered.