Record summary
A quick snapshot of what this page covers.
Techniques5Attack methods connected to this risk.
Mitigations11Defenses that may help with related attacks.
Domain2. Privacy & SecurityThe broad risk area this belongs to.
Risk profile
How this risk is described and categorized.
Domain2. Privacy & Security
Subdomain2.2 > AI system security vulnerabilities and attacks
Entity3 - Other
Intent3 - Other
Timing3 - Other
CategoryAI's inherent safety risks
SubcategoryRisks from models and algorithms (Risks of stealing and tampering)
Suggested mitigations
Defenses that may help with related attacks.
Restrict Number of AI Model Queries
Business and Data UnderstandingDeployment+1 more
Control Access to AI Models and Data in Production
DeploymentMonitoring and Maintenance
AI Telemetry Logging
DeploymentMonitoring and Maintenance
Privileged AI Agent Permissions Configuration
Deployment
Single-User AI Agent Permissions Configuration
Deployment
AI Agent Tools Permissions Configuration
Deployment
Human In-the-Loop for AI Agent Actions
Deployment
Restrict AI Agent Tool Invocation on Untrusted Data
Deployment
Segmentation of AI Agent Components
DeploymentBusiness and Data Understanding
Input and Output Validation for AI Agent Components
Business and Data UnderstandingData Preparation+1 more
Limit Public Release of Information
Business and Data Understanding
Source
Research source for this risk, when available.
Included resource
AI Safety Governance Framework
Original source
MIT AI Risk Repository
Open the public repository used for AI risk records and taxonomy fields.
