The OWASP Top 10 for Agentic Applications (2026) focuses specifically on AI agent threats: tool abuse, inter-agent attacks, rogue behavior. This is closer to Pipelock’s core than the LLM Top 10, which includes model-level concerns.

Pipelock covers all 10. Three strong, three moderate, four partial.

Coverage at a glance

#ThreatCoverage
ASI01Agent Goal HijackStrong
ASI02Tool MisusePartial
ASI03Identity & Privilege AbuseStrong
ASI04Supply Chain VulnerabilitiesPartial
ASI05Unexpected Code ExecutionModerate
ASI06Memory & Context PoisoningModerate
ASI07Insecure Inter-Agent CommunicationPartial
ASI08Cascading FailuresModerate
ASI09Human-Agent Trust ExploitationPartial
ASI10Rogue AgentsStrong

ASI01: Agent Goal Hijack (Strong)

Attackers redirect agent objectives through malicious text in external data: web pages, tool results, documents.

Pipelock scans every content entry point:

Gap: Regex-based detection can miss novel patterns. Classifier-based detection is on the roadmap.


ASI02: Tool Misuse (Partial)

Agents misuse legitimate tools due to prompt injection, misalignment, or unsafe delegation. Tools get called with destructive parameters or chained in unexpected ways.

Pipelock controls the network tool and scans MCP traffic:

Containment: Pipelock controls the HTTP fetch tool and scans MCP traffic bidirectionally. pipelock sandbox adds Landlock, seccomp, and network namespace isolation on Linux, and sandbox-exec profiles on macOS (alpha). On Windows, pair with agentsh or Anthropic srt.


ASI03: Identity & Privilege Abuse (Strong)

Attackers exploit inherited credentials, delegated permissions, or agent-to-agent trust to access resources beyond intended scope.


ASI04: Supply Chain Vulnerabilities (Partial)

Malicious or tampered tools, skill packages, models, or agent personas compromise execution.

Gap: No dependency scanning or model identity verification. Use Trivy or Dependabot.


ASI05: Unexpected Code Execution (Moderate)

Agents generate or execute attacker-controlled code through manipulated tool outputs.

Containment: Pipelock limits the blast radius by blocking exfiltration. pipelock sandbox also restricts code execution at the OS level (Linux: Landlock + seccomp + netns; macOS: sandbox-exec, alpha).


ASI06: Memory & Context Poisoning (Moderate)

Attackers corrupt the data sources an agent relies on for knowledge and decisions.

Gap: No semantic analysis of retrieved content. Pipelock detects pattern-based injection, not subtly misleading information.


ASI07: Insecure Inter-Agent Communication (Partial)

Agents in a multi-agent system attack each other through shared resources, message passing, or lateral movement through workspace files.

Gap: No runtime inter-agent communication policy yet.


ASI08: Cascading Failures (Moderate)

Failures propagate through agent chains. One agent’s error or compromise triggers failures downstream.

Gap: No circuit-breaker pattern or agent-level health checks yet.


ASI09: Human-Agent Trust Exploitation (Partial)

Attackers exploit the trust humans place in agent outputs, using agents as intermediaries to deliver manipulated content or unauthorized actions.

Gap: No user-facing UI for non-terminal environments. HITL is terminal-only.


ASI10: Rogue Agents (Strong)

Agents act outside their intended boundaries due to compromised objectives, misalignment, or adversarial manipulation.

This is where Pipelock’s architecture pays off:


The three OWASP frameworks

  1. Top 10 for LLM Applications (2025): model and application risks. 7/10 covered.
  2. Top 10 for Agentic Applications (ASI01-ASI10): this page. Agent-specific risks. 10/10 covered.
  3. Agentic AI Threats and Mitigations (T1-T15): broadest framework, 15 threats. 12/15 covered.

Further reading