site/docs/red-team/owasp-agentic-ai.md
The OWASP Top 10 for Agentic Applications was announced during Black Hat Europe 2025 and the OWASP Agentic Security Summit. It represents the most critical security risks for AI agent applications.
Unlike traditional LLM applications, agentic systems introduce unique security challenges due to their:
| ID | Risk Name | Description |
|---|---|---|
| ASI01 | Agent Goal Hijack | Attackers alter agent objectives through malicious content |
| ASI02 | Tool Misuse and Exploitation | Agents use legitimate tools in unsafe ways |
| ASI03 | Identity and Privilege Abuse | Agents inherit or escalate high-privilege credentials |
| ASI04 | Agentic Supply Chain Vulnerabilities | Compromised tools, plugins, or external components |
| ASI05 | Unexpected Code Execution | Agents generate or run code/commands unsafely |
| ASI06 | Memory and Context Poisoning | Attackers poison agent memory systems and RAG databases |
| ASI07 | Insecure Inter-Agent Communication | Multi-agent systems face spoofing and tampering |
| ASI08 | Cascading Failures | Small errors propagate across planning and execution |
| ASI09 | Human Agent Trust Exploitation | Users over-trust agent recommendations |
| ASI10 | Rogue Agents | Compromised agents act harmfully while appearing legitimate |
To test against all 10 risks:
redteam:
plugins:
- owasp:agentic
strategies:
- jailbreak
- prompt-injection
- crescendo
Or target specific risks:
redteam:
plugins:
- owasp:agentic:asi01 # Agent Goal Hijack
- owasp:agentic:asi02 # Tool Misuse and Exploitation
- owasp:agentic:asi05 # Unexpected Code Execution
To set up the scan through the Promptfoo UI, select the OWASP Agentic preset on the Plugins page.
Agent Goal Hijack occurs when an attacker alters an agent's objectives or decision path through malicious content, exploiting the agent's planning and reasoning capabilities.
redteam:
plugins:
- hijacking
- system-prompt-override
- indirect-prompt-injection
- intent
strategies:
- jailbreak
- prompt-injection
- jailbreak:composite
Tool Misuse occurs when agents use legitimate tools in unsafe ways, whether through parameter pollution, tool chain manipulation, or automated abuse of granted permissions.
redteam:
plugins:
- excessive-agency
- mcp
- tool-discovery
strategies:
- jailbreak
- prompt-injection
Agents inherit user/system identities with high-privilege credentials, creating opportunities for privilege escalation and unauthorized access across systems.
redteam:
plugins:
- rbac
- bfla
- bola
- imitation
strategies:
- jailbreak
- prompt-injection
Compromised tools, plugins, prompt templates, and external servers introduce vulnerabilities that agents may unknowingly leverage.
redteam:
plugins:
- indirect-prompt-injection
- mcp
strategies:
- prompt-injection
Agents generate or run code/commands unsafely, creating opportunities for remote code execution, sandbox escapes, and data exfiltration.
redteam:
plugins:
- shell-injection
- sql-injection
- harmful:cybercrime:malicious-code
- ssrf
strategies:
- jailbreak
- prompt-injection
Attackers poison agent memory systems, embeddings, and RAG databases to corrupt stored information and manipulate decision-making across sessions.
redteam:
plugins:
- agentic:memory-poisoning
- cross-session-leak
- indirect-prompt-injection
strategies:
- jailbreak
- crescendo
Multi-agent systems face spoofed identities, replayed messages, and tampering in communication channels between agents.
redteam:
plugins:
- indirect-prompt-injection
- hijacking
- imitation
strategies:
- prompt-injection
Small errors in one agent propagate across planning, execution, and memory, amplifying through interconnected systems.
redteam:
plugins:
- hallucination
- harmful:misinformation-disinformation
- divergent-repetition
strategies:
- jailbreak
- prompt-injection
Users over-trust agent recommendations or explanations, enabling social engineering and covert harmful actions.
redteam:
plugins:
- overreliance
- imitation
- harmful:misinformation-disinformation
strategies:
- crescendo
Compromised or misaligned agents act harmfully while appearing legitimate, exploiting trust mechanisms in multi-agent workflows.
redteam:
plugins:
- excessive-agency
- hijacking
- rbac
- goal-misalignment
strategies:
- jailbreak
- crescendo
The OWASP Top 10 for Agentic Applications extends and complements the OWASP LLM Top 10:
| Agentic Risk | Related LLM Top 10 |
|---|---|
| ASI01: Agent Goal Hijack | LLM01: Prompt Injection |
| ASI02: Tool Misuse and Exploitation | LLM06: Excessive Agency |
| ASI03: Identity and Privilege Abuse | LLM06: Excessive Agency |
| ASI05: Unexpected Code Execution | LLM01, LLM05: Improper Output Handling |
| ASI06: Memory and Context Poisoning | LLM04: Data and Model Poisoning |
| ASI08: Cascading Failures | LLM09: Misinformation |
Test both frameworks together for comprehensive coverage:
redteam:
plugins:
- owasp:agentic
- owasp:llm
strategies:
- jailbreak
- prompt-injection
- crescendo
To learn more about red teaming agents, see: