Skip to content

Commit d747278

Browse files
authored
Merge pull request OWASP#711 from jsotiro/main
Merged sprint 1 example entires files updates by John
2 parents 3d4db1e + a7cd06c commit d747278

12 files changed

+324
-0
lines changed
Lines changed: 28 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,28 @@
1+
## ASI01 – Agent Behaviour Hijack
2+
3+
**Description:**
4+
5+
A brief description of the vulnerability that includes its potential effects such as system compromises, data breaches, or other security concerns.
6+
7+
**Common Examples of Vulnerability:**
8+
9+
1. Example 1: Specific instance or type of this vulnerability.
10+
2. Example 2: Another instance or type of this vulnerability.
11+
3. Example 3: Yet another instance or type of this vulnerability.
12+
13+
**How to Prevent:**
14+
15+
1. Prevention Step 1: A step or strategy that can be used to prevent the vulnerability or mitigate its effects.
16+
2. Prevention Step 2: Another prevention step or strategy.
17+
3. Prevention Step 3: Yet another prevention step or strategy.
18+
19+
**Example Attack Scenarios:**
20+
21+
Scenario #1: A detailed scenario illustrating how an attacker could potentially exploit this vulnerability, including the attacker's actions and the potential outcomes.
22+
23+
Scenario #2: Another example of an attack scenario showing a different way the vulnerability could be exploited.
24+
25+
**Reference Links:**
26+
27+
1. [Link Title](URL): Brief description of the reference link.
28+
2. [Link Title](URL): Brief description of the reference link.
Lines changed: 28 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,28 @@
1+
## ASI02 – Tool Misuse and Exploitation
2+
3+
**Description:**
4+
5+
A brief description of the vulnerability that includes its potential effects such as system compromises, data breaches, or other security concerns.
6+
7+
**Common Examples of Vulnerability:**
8+
9+
1. Example 1: Specific instance or type of this vulnerability.
10+
2. Example 2: Another instance or type of this vulnerability.
11+
3. Example 3: Yet another instance or type of this vulnerability.
12+
13+
**How to Prevent:**
14+
15+
1. Prevention Step 1: A step or strategy that can be used to prevent the vulnerability or mitigate its effects.
16+
2. Prevention Step 2: Another prevention step or strategy.
17+
3. Prevention Step 3: Yet another prevention step or strategy.
18+
19+
**Example Attack Scenarios:**
20+
21+
Scenario #1: A detailed scenario illustrating how an attacker could potentially exploit this vulnerability, including the attacker's actions and the potential outcomes.
22+
23+
Scenario #2: Another example of an attack scenario showing a different way the vulnerability could be exploited.
24+
25+
**Reference Links:**
26+
27+
1. [Link Title](URL): Brief description of the reference link.
28+
2. [Link Title](URL): Brief description of the reference link.
Lines changed: 28 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,28 @@
1+
## ASI03 – Identity & Privilege Abuse
2+
3+
**Description:**
4+
5+
A brief description of the vulnerability that includes its potential effects such as system compromises, data breaches, or other security concerns.
6+
7+
**Common Examples of Vulnerability:**
8+
9+
1. Example 1: Specific instance or type of this vulnerability.
10+
2. Example 2: Another instance or type of this vulnerability.
11+
3. Example 3: Yet another instance or type of this vulnerability.
12+
13+
**How to Prevent:**
14+
15+
1. Prevention Step 1: A step or strategy that can be used to prevent the vulnerability or mitigate its effects.
16+
2. Prevention Step 2: Another prevention step or strategy.
17+
3. Prevention Step 3: Yet another prevention step or strategy.
18+
19+
**Example Attack Scenarios:**
20+
21+
Scenario #1: A detailed scenario illustrating how an attacker could potentially exploit this vulnerability, including the attacker's actions and the potential outcomes.
22+
23+
Scenario #2: Another example of an attack scenario showing a different way the vulnerability could be exploited.
24+
25+
**Reference Links:**
26+
27+
1. [Link Title](URL): Brief description of the reference link.
28+
2. [Link Title](URL): Brief description of the reference link.
Lines changed: 28 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,28 @@
1+
## ASI04 – Agentic Supply Chain Vulnerabilities
2+
3+
**Description:**
4+
5+
A brief description of the vulnerability that includes its potential effects such as system compromises, data breaches, or other security concerns.
6+
7+
**Common Examples of Vulnerability:**
8+
9+
1. Example 1: Specific instance or type of this vulnerability.
10+
2. Example 2: Another instance or type of this vulnerability.
11+
3. Example 3: Yet another instance or type of this vulnerability.
12+
13+
**How to Prevent:**
14+
15+
1. Prevention Step 1: A step or strategy that can be used to prevent the vulnerability or mitigate its effects.
16+
2. Prevention Step 2: Another prevention step or strategy.
17+
3. Prevention Step 3: Yet another prevention step or strategy.
18+
19+
**Example Attack Scenarios:**
20+
21+
Scenario #1: A detailed scenario illustrating how an attacker could potentially exploit this vulnerability, including the attacker's actions and the potential outcomes.
22+
23+
Scenario #2: Another example of an attack scenario showing a different way the vulnerability could be exploited.
24+
25+
**Reference Links:**
26+
27+
1. [Link Title](URL): Brief description of the reference link.
28+
2. [Link Title](URL): Brief description of the reference link.
Lines changed: 28 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,28 @@
1+
## ASI05 – Unexpected Code Execution (RCE)
2+
3+
**Description:**
4+
5+
A brief description of the vulnerability that includes its potential effects such as system compromises, data breaches, or other security concerns.
6+
7+
**Common Examples of Vulnerability:**
8+
9+
1. Example 1: Specific instance or type of this vulnerability.
10+
2. Example 2: Another instance or type of this vulnerability.
11+
3. Example 3: Yet another instance or type of this vulnerability.
12+
13+
**How to Prevent:**
14+
15+
1. Prevention Step 1: A step or strategy that can be used to prevent the vulnerability or mitigate its effects.
16+
2. Prevention Step 2: Another prevention step or strategy.
17+
3. Prevention Step 3: Yet another prevention step or strategy.
18+
19+
**Example Attack Scenarios:**
20+
21+
Scenario #1: A detailed scenario illustrating how an attacker could potentially exploit this vulnerability, including the attacker's actions and the potential outcomes.
22+
23+
Scenario #2: Another example of an attack scenario showing a different way the vulnerability could be exploited.
24+
25+
**Reference Links:**
26+
27+
1. [Link Title](URL): Brief description of the reference link.
28+
2. [Link Title](URL): Brief description of the reference link.
Lines changed: 28 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,28 @@
1+
## ASI06 – Memory & Context Poisoning
2+
3+
**Description:**
4+
5+
A brief description of the vulnerability that includes its potential effects such as system compromises, data breaches, or other security concerns.
6+
7+
**Common Examples of Vulnerability:**
8+
9+
1. Example 1: Specific instance or type of this vulnerability.
10+
2. Example 2: Another instance or type of this vulnerability.
11+
3. Example 3: Yet another instance or type of this vulnerability.
12+
13+
**How to Prevent:**
14+
15+
1. Prevention Step 1: A step or strategy that can be used to prevent the vulnerability or mitigate its effects.
16+
2. Prevention Step 2: Another prevention step or strategy.
17+
3. Prevention Step 3: Yet another prevention step or strategy.
18+
19+
**Example Attack Scenarios:**
20+
21+
Scenario #1: A detailed scenario illustrating how an attacker could potentially exploit this vulnerability, including the attacker's actions and the potential outcomes.
22+
23+
Scenario #2: Another example of an attack scenario showing a different way the vulnerability could be exploited.
24+
25+
**Reference Links:**
26+
27+
1. [Link Title](URL): Brief description of the reference link.
28+
2. [Link Title](URL): Brief description of the reference link.
Lines changed: 28 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,28 @@
1+
## ASI07 – Insecure Inter-Agent Communication
2+
3+
**Description:**
4+
5+
A brief description of the vulnerability that includes its potential effects such as system compromises, data breaches, or other security concerns.
6+
7+
**Common Examples of Vulnerability:**
8+
9+
1. Example 1: Specific instance or type of this vulnerability.
10+
2. Example 2: Another instance or type of this vulnerability.
11+
3. Example 3: Yet another instance or type of this vulnerability.
12+
13+
**How to Prevent:**
14+
15+
1. Prevention Step 1: A step or strategy that can be used to prevent the vulnerability or mitigate its effects.
16+
2. Prevention Step 2: Another prevention step or strategy.
17+
3. Prevention Step 3: Yet another prevention step or strategy.
18+
19+
**Example Attack Scenarios:**
20+
21+
Scenario #1: A detailed scenario illustrating how an attacker could potentially exploit this vulnerability, including the attacker's actions and the potential outcomes.
22+
23+
Scenario #2: Another example of an attack scenario showing a different way the vulnerability could be exploited.
24+
25+
**Reference Links:**
26+
27+
1. [Link Title](URL): Brief description of the reference link.
28+
2. [Link Title](URL): Brief description of the reference link.
Lines changed: 28 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,28 @@
1+
## ASI08 – Cascading Failures
2+
3+
**Description:**
4+
5+
A brief description of the vulnerability that includes its potential effects such as system compromises, data breaches, or other security concerns.
6+
7+
**Common Examples of Vulnerability:**
8+
9+
1. Example 1: Specific instance or type of this vulnerability.
10+
2. Example 2: Another instance or type of this vulnerability.
11+
3. Example 3: Yet another instance or type of this vulnerability.
12+
13+
**How to Prevent:**
14+
15+
1. Prevention Step 1: A step or strategy that can be used to prevent the vulnerability or mitigate its effects.
16+
2. Prevention Step 2: Another prevention step or strategy.
17+
3. Prevention Step 3: Yet another prevention step or strategy.
18+
19+
**Example Attack Scenarios:**
20+
21+
Scenario #1: A detailed scenario illustrating how an attacker could potentially exploit this vulnerability, including the attacker's actions and the potential outcomes.
22+
23+
Scenario #2: Another example of an attack scenario showing a different way the vulnerability could be exploited.
24+
25+
**Reference Links:**
26+
27+
1. [Link Title](URL): Brief description of the reference link.
28+
2. [Link Title](URL): Brief description of the reference link.
Lines changed: 28 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,28 @@
1+
## ASI09 – Human-Agent Trust Exploitation
2+
3+
**Description:**
4+
5+
A brief description of the vulnerability that includes its potential effects such as system compromises, data breaches, or other security concerns.
6+
7+
**Common Examples of Vulnerability:**
8+
9+
1. Example 1: Specific instance or type of this vulnerability.
10+
2. Example 2: Another instance or type of this vulnerability.
11+
3. Example 3: Yet another instance or type of this vulnerability.
12+
13+
**How to Prevent:**
14+
15+
1. Prevention Step 1: A step or strategy that can be used to prevent the vulnerability or mitigate its effects.
16+
2. Prevention Step 2: Another prevention step or strategy.
17+
3. Prevention Step 3: Yet another prevention step or strategy.
18+
19+
**Example Attack Scenarios:**
20+
21+
Scenario #1: A detailed scenario illustrating how an attacker could potentially exploit this vulnerability, including the attacker's actions and the potential outcomes.
22+
23+
Scenario #2: Another example of an attack scenario showing a different way the vulnerability could be exploited.
24+
25+
**Reference Links:**
26+
27+
1. [Link Title](URL): Brief description of the reference link.
28+
2. [Link Title](URL): Brief description of the reference link.
Lines changed: 28 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,28 @@
1+
## ASI10 – Rogue Agents
2+
3+
**Description:**
4+
5+
A brief description of the vulnerability that includes its potential effects such as system compromises, data breaches, or other security concerns.
6+
7+
**Common Examples of Vulnerability:**
8+
9+
1. Example 1: Specific instance or type of this vulnerability.
10+
2. Example 2: Another instance or type of this vulnerability.
11+
3. Example 3: Yet another instance or type of this vulnerability.
12+
13+
**How to Prevent:**
14+
15+
1. Prevention Step 1: A step or strategy that can be used to prevent the vulnerability or mitigate its effects.
16+
2. Prevention Step 2: Another prevention step or strategy.
17+
3. Prevention Step 3: Yet another prevention step or strategy.
18+
19+
**Example Attack Scenarios:**
20+
21+
Scenario #1: A detailed scenario illustrating how an attacker could potentially exploit this vulnerability, including the attacker's actions and the potential outcomes.
22+
23+
Scenario #2: Another example of an attack scenario showing a different way the vulnerability could be exploited.
24+
25+
**Reference Links:**
26+
27+
1. [Link Title](URL): Brief description of the reference link.
28+
2. [Link Title](URL): Brief description of the reference link.

0 commit comments

Comments
 (0)