The AI Agent Security Field Guide
The AI Agent Security
Field Guide
20+ pages mapping the OWASP Agentic Top 10 to real attack patterns — with the mitigations your team can deploy immediately.
Free · No second form · Immediate download
All 10 ASI risks mapped
Each OWASP Agentic Top 10 entry explained with a real incident reference, attack mechanism, and 2–3 specific controls.
Production-focused
Written for teams running agents now — not theoretical. Every control maps to something you can implement this week.
Real incidents, named
DockerDash, WhatsApp MCP, CVE-2025-6514, Gemini memory corruption — the actual breaches, not hypotheticals.
Actionable mitigations
mcp-scan, tool description hashing, human approval gates, per-server namespacing — specific tools and techniques.
What’s inside
ASI01–ASI10 mapped — every OWASP Agentic Top 10 risk with real incident reference, attack mechanism, and 2–3 specific controls your team can act on immediately.
MCP attack patterns — tool poisoning, meta-context injection, and cross-server attacks with code examples showing how they work in practice.
Real incidents, named — DockerDash supply chain compromise, WhatsApp MCP data exfiltration, CVE-2025-6514, Gemini memory corruption. The actual breaches, not hypotheticals.
Actionable controls — mcp-scan, tool description hashing, human approval gates, least-privilege architecture, per-server namespacing. Specific tools and techniques, not abstract guidance.
Written for security engineers and CTOs running agentic systems in production — not a theoretical overview of what AI risks might someday exist.
Free · No second form · Immediate download
Amine Raji, PhD · CISSP · aminrj.com