ClawdContext

Agentic Threat Model

Understanding the unique security challenges of AI agents with tool access.

Why Agentic AI is Different

Traditional Applications

  • Fixed execution paths
  • Predictable behavior
  • Static attack surface
  • User initiates all actions

Agentic AI Systems

  • Dynamic, autonomous decisions
  • Emergent behaviors
  • Expanding attack surface
  • Agent can initiate actions
💉

Prompt Injection

Malicious inputs designed to hijack agent behavior and access tools unauthorizedly.

CRITICAL

⚠️Attack Vectors

  • Direct prompt manipulation ("Ignore previous instructions")
  • Jailbreak attempts using roleplay scenarios
  • Encoded payloads in file names, document content, or tool inputs
  • Multi-turn prompt chains to bypass safeguards

🛡️Mitigations

  • Strict input validation and sanitization
  • Tool output filtering and validation
  • Separation of data and control channels
  • Human-in-the-loop for sensitive operations
🔧

Tool Abuse

Legitimate tools can be weaponized to perform unauthorized actions against your systems.

HIGH

⚠️Attack Vectors

  • File system tools to exfiltrate sensitive data
  • Network tools to pivot to internal systems
  • Code execution tools for cryptocurrency mining
  • Database tools to dump credentials or modify records

🛡️Mitigations

  • Principle of least privilege for all tools
  • Sandboxed execution environments
  • Resource quotas and rate limiting
  • Tool-specific allowlists and blocklists
🌐

Surface Exposure

Each tool exponentially increases your attack surface. More tools = more vulnerability points.

HIGH

⚠️Attack Vectors

  • Exposed admin interfaces without authentication
  • Debug endpoints accessible from the internet
  • Default credentials never changed
  • APIs documented but not secured

🛡️Mitigations

  • No default credentials; force setup on first run
  • VPN or private network for admin access
  • Regular security audits of exposed endpoints
  • Automated exposure detection
📈

Privilege Escalation

Agents can be tricked into exceeding their intended permissions and accessing restricted resources.

CRITICAL

⚠️Attack Vectors

  • Prompting agent to impersonate privileged users
  • Chaining multiple tools to bypass individual restrictions
  • Exploiting trust relationships between services
  • Modifying configuration files to elevate permissions

🛡️Mitigations

  • Zero-trust architecture: verify every request
  • Immutable infrastructure where possible
  • Role-based access control (RBAC) with regular audits
  • Separation of duties for sensitive operations

Security is a Journey, Not a Destination

Start with our comprehensive checklist to assess and harden your agentic AI deployments.

Get the Checklist