Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
47 changes: 47 additions & 0 deletions catalogs/ai-ml/gen-ai/controls.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -108,6 +108,20 @@ control-families:
- reference-id: AML.M0015
strength: 0 # Not yet specified
remarks: Adversarial Input Detection
- reference-id: agent-threat-rules
entries:
- reference-id: ATR-2026-00001
strength: 0 # Not yet specified
remarks: Direct Prompt Injection via User Input — detection-side coverage for adversarial input that this control mandates be filtered/sanitised.
- reference-id: ATR-2026-00002
strength: 0 # Not yet specified
remarks: Indirect Prompt Injection (via RAG / tool output / retrieved content) — covers the untrusted-input path AR01 explicitly calls out.
- reference-id: ATR-2026-00003
strength: 0 # Not yet specified
remarks: Jailbreak / system-prompt-override attempts at input layer.
- reference-id: ATR-2026-00440
strength: 0 # Not yet specified
remarks: Semantic Kernel CVE-2026-26030 lambda+eval RCE via filter-expression input.

- id: CCC.GenAI.CN02
title: Model Output Filtering and Sanitisation
Expand Down Expand Up @@ -182,6 +196,17 @@ control-families:
- reference-id: AML.M0002
strength: 0 # Not yet specified
remarks: Passive AI Output Obfuscation
- reference-id: agent-threat-rules
entries:
- reference-id: ATR-2026-00020
strength: 0 # Not yet specified
remarks: System Prompt / Initial-Configuration Leak in Model Output — output-side detection for the sensitive-data-disclosure path.
- reference-id: ATR-2026-00021
strength: 0 # Not yet specified
remarks: API Key / Credential Exposure in Model Output — covers TH03 sensitive-information-disclosure at output sanitisation point.
- reference-id: ATR-2026-00132
strength: 0 # Not yet specified
remarks: Output containing covert-instruction or persona-override content — adversarial output pattern for AR02 rejection / redaction.

- id: CCC.GenAI.CN03
title: Data Provenance and Source Vetting
Expand Down Expand Up @@ -289,6 +314,14 @@ control-families:
- reference-id: AML.M0007
strength: 0 # Not yet specified
remarks: Sanitize Training Data
- reference-id: agent-threat-rules
entries:
- reference-id: ATR-2026-00002
strength: 0 # Not yet specified
remarks: Indirect Prompt Injection (RAG / ingested-content / tool-output path) — detection-side coverage for malicious payloads embedded in ingested data per AR01.
- reference-id: ATR-2026-00021
strength: 0 # Not yet specified
remarks: Credential / API-key disclosure in ingested content — sensitive-information path for AR01 detection.

- id: CCC.GenAI.CN05
title: Citations and Source Traceability
Expand Down Expand Up @@ -367,6 +400,20 @@ control-families:
entries:
- reference-id: Agent Permissions
strength: 0 # Not yet specified
- reference-id: agent-threat-rules
entries:
- reference-id: ATR-2026-00010
strength: 0 # Not yet specified
remarks: Tool / MCP response with malicious content — covers TH07 Insecure Plugin at the tool-response layer.
- reference-id: ATR-2026-00040
strength: 0 # Not yet specified
remarks: Privilege Escalation / Admin Function Access via tool calls — covers the over-privileged-tool-invocation aspect of AR01.
- reference-id: ATR-2026-00060
strength: 0 # Not yet specified
remarks: Skill / Plugin Impersonation — covers the trust-boundary aspect of plugin selection.
- reference-id: ATR-2026-00441
strength: 0 # Not yet specified
remarks: Semantic Kernel SessionsPythonPlugin CVE-2026-25592 — over-privileged plugin enabling sandbox escape via autostart-path file write. Concrete TH06 / TH07 example.

- title: Configuration Management
description: |
Expand Down
20 changes: 19 additions & 1 deletion catalogs/ai-ml/gen-ai/metadata.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -21,4 +21,22 @@ metadata:
service: Google Vertex AI
url: https://cloud.google.com/vertex-ai/docs
applicability-categories: []
mapping-references: []
mapping-references:
- id: agent-threat-rules
title: Agent Threat Rules
version: v2.1.2
description: |
Agent Threat Rules (ATR) is an open MIT-licensed detection-rule
corpus for AI agent threats spanning ten attack categories
(prompt-injection, tool-poisoning, skill-compromise,
agent-manipulation, context-exfiltration, data-poisoning,
excessive-autonomy, model-abuse, model-security, privilege-escalation).
Rules are deterministic YAML and ship as the upstream detection
layer in Cisco AI Defense and Microsoft Agent Governance Toolkit,
and are referenced by the MISP taxonomy and galaxy threat-intel
sharing layers (taxonomies#323, galaxy#1207, both merged by the
MISP project lead on 2026-05-10). The mapping from CCC GenAI
controls is one-way and lossy: ATR rule-IDs reference detection
coverage that is adjacent to a control's intent, not control
equivalents themselves.
url: https://github.com/Agent-Threat-Rule/agent-threat-rules
Loading