Discussion about this post

User's avatar
The AI Architect's avatar

Really solid breakdown of the OWASP Agentic Top 10. The emphasis on ASI06 (memory poisoning) is particularly interesting because most orgs still think about security at the request layer but agent memory creates persistent attack surfaces that accumulate over time. The turbine baseline example is terrifying because teh corruption happens gradually enough that anomaly detection won't flag it. I'm curious how teams are implementing memory decay policies in practice, seems like alot of production deployments just let RAG stores grow indefinitely without any verification.

No posts

Ready for more?