616 B
616 B
Threat model (draft)
Assets to protect
- host filesystem and secrets
- network access and credentials
- tool side effects (writes, API calls, deletes)
- user data and memory stores
- audit and provenance integrity
Adversaries / failure modes
- prompt injection leading to unsafe tool usage
- malicious tool plugins
- hallucinated or forged tool outputs
- data exfiltration via tool channels
- runaway cost due to repeated retries/loops
Strategy
- least authority via capabilities
- isolation domains for tool execution
- policy gate for side effects
- provenance for every tool call and memory commit