multicorn

How Shield maps to the OWASP Top 10 for Agentic Applications

Shield was built to solve the problems OWASP formalised. Here is how each risk maps to a shipping feature.

Coverage at a glance

Shield is not OWASP-certified. This table shows how each risk in the OWASP Top 10 for Agentic Applications maps to features Shield ships today.

IDRiskStatus
ASI-01Agent goal hijackPartially mitigated
ASI-02Tool misuseMitigated
ASI-03Excessive permissionsMitigated
ASI-04Inadequate sandboxingNot applicable
ASI-05Unexpected code executionPartially mitigated
ASI-06Context manipulationPartially mitigated
ASI-07Insecure inter-agent communicationNot applicable
ASI-08Cascading failuresPartially mitigated
ASI-09Human-agent trust exploitationMitigated
ASI-10Rogue agentsMitigated

ASI-01: Agent goal hijack

Partially mitigated

An attacker manipulates the agent into pursuing a different objective than the one the user intended.

How Shield addresses this

Consent screens require explicit user approval before the agent acts. Scope-based permissions restrict what the agent can target. Action logging creates an audit trail of what the agent actually did vs what it was asked to do.

ASI-02: Tool misuse

Mitigated

The agent calls tools in ways that were not intended, causing unintended side effects or data loss.

How Shield addresses this

The MCP proxy intercepts every tool call before execution. Permission scopes restrict which tools each agent can access. Spending controls cap financial exposure per transaction, per day, and per month. Approval workflows gate high-risk tool calls on human review.

ASI-03: Excessive permissions

Mitigated

An agent holds broader access than it needs, increasing the blast radius when something goes wrong.

How Shield addresses this

This is Shield's core value proposition. Scoped permissions enforce least privilege per agent per service. The consent screen makes permission grants visible and revocable. The dashboard shows exactly what each agent can access.

ASI-04: Inadequate sandboxing

Not applicable

The agent runs without OS-level isolation, so a compromised agent can reach host resources directly.

How Shield addresses this

Shield operates at the MCP protocol layer, not the OS/runtime layer. Sandboxing is handled by tools like Agent Safehouse (macOS) or agentsh (Linux). Shield complements these by governing what the agent is allowed to do within its sandbox.

ASI-05: Unexpected code execution

Partially mitigated

The agent generates and runs code that the user did not review, opening the door to arbitrary execution.

How Shield addresses this

Shield's permission scopes can restrict execute-level access. The MCP proxy blocks tool calls outside the granted scope set. However, Shield does not inspect generated code for safety.

ASI-06: Context manipulation

Partially mitigated

An attacker tampers with the data the agent reads, poisoning its decisions without changing the model itself.

How Shield addresses this

The audit trail with SHA-256 hash chaining provides tamper-evident logging. Reconnaissance detection flags agents probing metadata or context they should not have access to. However, Shield does not inspect or validate RAG context directly.

ASI-07: Insecure inter-agent communication

Not applicable

Agents pass messages to each other without authentication or integrity checks, allowing spoofing or injection.

How Shield addresses this

Shield governs individual agent-to-tool interactions, not agent-to-agent protocols. Multi-agent delegation and trust chains are on the future roadmap.

ASI-08: Cascading failures

Partially mitigated

One agent error triggers a chain reaction across connected systems, amplifying a small problem into a large outage.

How Shield addresses this

Spending controls and burst detection act as circuit breakers. When an agent triggers a spending alert or burst activity threshold, it can be auto-frozen, stopping the cascade. Retaliation detection catches escalation patterns where a blocked agent targets the entity that blocked it.

ASI-09: Human-agent trust exploitation

Mitigated

The agent presents misleading information to trick a human into approving something they should not.

How Shield addresses this

Consent screens present permission requests in a clear, user-facing UI that cannot be manipulated by the agent. The consent screen uses Shadow DOM to prevent CSS injection. Approval workflows require explicit human decisions for high-risk actions.

ASI-10: Rogue agents

Mitigated

An agent operates outside its intended boundaries, taking actions that were never authorised.

How Shield addresses this

Agent freeze capability provides a kill switch. Anomaly detection identifies rogue behaviour patterns automatically. The audit trail provides forensic evidence of what a rogue agent did. Scope revocation is immediate and takes effect on the next tool call.

Need more from your compliance tooling?

Need compliance audit exports or custom data retention? These are available on the Enterprise plan.

Get started with Shield

Shield gives your team consent screens, spending controls, and activity logging for every AI agent. Set up in minutes, free to start.