Record summary
A quick snapshot of what this page covers.
Techniques3Attack methods connected to this risk.
Mitigations6Defenses that may help with related attacks.
Domain4. Malicious Actors & MisuseThe broad risk area this belongs to.
Risk profile
How this risk is described and categorized.
Domain4. Malicious Actors & Misuse
Subdomain4.0 > Malicious use
Entity3 - Other
Intent1 - Intentional
Timing3 - Other
CategoryUser Intent
SubcategoryMalicious and Indirect
Suggested mitigations
Defenses that may help with related attacks.
AI Telemetry Logging
DeploymentMonitoring and Maintenance
Input and Output Validation for AI Agent Components
Business and Data UnderstandingData Preparation+1 more
Passive AI Output Obfuscation
DeploymentML Model Evaluation
Encrypt Sensitive Information
Data PreparationML Model Engineering+1 more
AI Model Distribution Methods
Deployment
Control Access to AI Models and Data in Production
DeploymentMonitoring and Maintenance
Source
Research source for this risk, when available.
Included resource
Risks of AI Scientists: Prioritizing Safeguarding Over Autonomy
Original source
MIT AI Risk Repository
Open the public repository used for AI risk records and taxonomy fields.
