Record summary
A quick snapshot of what this page covers.
Techniques8Attack methods connected to this risk.
Mitigations16Defenses that may help with related attacks.
Domain2. Privacy & SecurityThe broad risk area this belongs to.
Risk profile
How this risk is described and categorized.
Domain2. Privacy & Security
Subdomain2.2 > AI system security vulnerabilities and attacks
Entity1 - Human
Intent1 - Intentional
Timing2 - Post-deployment
CategoryMisuse tactics to compromise GenAI systems (Model integrity)
SubcategoryAdversarial input
Suggested mitigations
Defenses that may help with related attacks.
Use Multi-Modal Sensors
Business and Data UnderstandingData Preparation+1 more
Sanitize Training Data
Business and Data UnderstandingData Preparation+1 more
Maintain AI Dataset Provenance
Data PreparationBusiness and Data Understanding
AI Telemetry Logging
DeploymentMonitoring and Maintenance
Privileged AI Agent Permissions Configuration
Deployment
Single-User AI Agent Permissions Configuration
Deployment
AI Agent Tools Permissions Configuration
Deployment
Human In-the-Loop for AI Agent Actions
Deployment
Restrict AI Agent Tool Invocation on Untrusted Data
Deployment
Segmentation of AI Agent Components
DeploymentBusiness and Data Understanding
Input and Output Validation for AI Agent Components
Business and Data UnderstandingData Preparation+1 more
Model Hardening
Data PreparationML Model Engineering
Use Ensemble Methods
ML Model Engineering
Validate AI Model
ML Model EvaluationMonitoring and Maintenance
Input Restoration
Data PreparationML Model Evaluation+2 more
Adversarial Input Detection
Data PreparationML Model Engineering+3 more
Source
Research source for this risk, when available.
Included resource
Generative AI Misuse: A Taxonomy of Tactics and Insights from Real-World Data
Original source
MIT AI Risk Repository
Open the public repository used for AI risk records and taxonomy fields.
