Updated: 2026-02-26 Source: https://genai.owasp.org/resource/owasp-top-10-for-agentic-applications-for-2026/
| Coverage | Count |
|---|---|
| ✅ Full | 9/10 |
| ⚠️ Partial | 1/10 |
| ❌ None | 0/10 |
The full platform (sentinel-core + shield + immune) achieves 9/10 coverage. Sentinel Lattice primitives (TSA, L2, AAS, CAFL, GPS, IRM, MIRE, PASR) provide formal-methods coverage that no pattern-matching tool can achieve alone.
Risk: Attacker alters agent’s objectives through malicious content
SENTINEL Coverage (Rust):
injection.rs — prompt injection detection (SQL, NoSQL, Command, LDAP, XPath)jailbreak.rs — 704+ patterns including roleplay, authority bypass, DANbehavioral.rs — goal deviation analysiscognitive_guard.rs — AVI cognitive bias detectiongoal_predictability.rs — GPS: 16-bit state enumeration, predictive defense 🆕 Latticeintent_revelation.rs — IRM: mechanism design for intent detection 🆕 LatticeStatus: FULLY COVERED (pattern + formal methods)
Risk: Agent uses legitimate tools in unsafe/unintended ways
SENTINEL Coverage (Rust):
tool_abuse.rs — agent tool misuse detectiontool_shadowing.rs — MCP tool shadowing / Shadow Escapetool_call_injection.rs — injected tool call detectioncross_tool_guard.rs — cross-tool attack chainscapability_proxy.rs — L2: Bell-LaPadula, provenance tags, NEVER lists 🆕 Latticecapability_flow.rs — CAFL: capabilities only decrease through flow labels 🆕 LatticeStatus: FULLY COVERED (pattern + capability enforcement)
Risk: Agent escalates privileges or abuses inherited credentials
SENTINEL Coverage (Rust):
pii.rs — credential leak detectionevasion.rs — obfuscation techniques detectioncapability_proxy.rs — L2: Bell-LaPadula mandatory access control 🆕 Latticetemporal_safety.rs — TSA: temporal privilege escalation detection 🆕 Latticeshield: trust zones + policy engine (Cisco IOS-style runtime enforcement)immune: syscall hooks (BSD sysent + Linux kprobes) for privilege monitoringStatus: FULLY COVERED (detection + runtime enforcement via shield trust zones + immune syscall hooks)
Risk: Poisoned RAG data, vulnerable tools/plugins, compromised models
SENTINEL Coverage (Rust):
supply_chain.rs — supply chain security scanningrag.rs — RAG document security analysisdormant_payload.rs — Phantom/CorruptRAG dormant payloadsprovenance_reduction.rs — PASR: categorical fibration for provenance tracking 🆕 LatticeStatus: FULLY COVERED (pattern + provenance tracking)
Risk: Agent generates and executes malicious code
SENTINEL Coverage (Rust):
code_security.rs — AI-generated code vulnerability scoringinjection.rs — command injection patternsworkspace_guard.rs — workspace-level file protectionimmune: BSD jail quarantine (process + file isolation via jail() API)immune: eBPF agent (execve monitoring via libbpf)Gap: Linux sandbox is stub (no namespaces/seccomp) — BSD jail only
Status: PARTIAL (detection + BSD sandbox via immune jail, no Linux sandbox)
Risk: Malicious data injected into agent’s long-term memory
SENTINEL Coverage (Rust):
memory_integrity.rs — memory poisoning detectionoperational_context_injection.rs — operational context injectiontemporal_safety.rs — TSA: temporal sequence violation detection 🆕 Latticeargumentation_safety.rs — AAS: Dung grounded semantics for argument integrity 🆕 LatticeStatus: FULLY COVERED (pattern + formal temporal/argument analysis)
Risk: Message forging/impersonation between agents
SENTINEL Coverage (Rust):
orchestration.rs — multi-agent orchestration securityagentic.rs — ToolCall-based agent securitymodel_containment.rs — MIRE: containment proofs for model boundaries 🆕 Latticeimmune: TLS 1.3 mTLS (wolfSSL, cert pinning) + AES-256-GCM + RSA-4096 (OpenSSL)immune: Sybil defense (PoW join barrier, trust scoring, vouching, blacklisting)Status: FULLY COVERED (detection + containment + production-grade mTLS + crypto auth)
Risk: Small error triggers destructive chain reaction
SENTINEL Coverage (Rust):
lethal_trifecta.rs — dangerous capability combination detectioncapability_flow.rs — CAFL: monotonic capability attenuation 🆕 Latticeshield: watchdog (health checks, deadlock detection, auto-recovery, alert escalation)shield: circuit_breaker (closed/open/half-open failure isolation)shield: HA clustering (heartbeat + state replication + failover)immune: XDR correlation engine (lateral movement, exfil, attack chain detection)Status: FULLY COVERED (runtime cascade monitoring via shield watchdog + circuit breaker + immune XDR correlation)
Risk: Agent output deceives human into approving malicious action
SENTINEL Coverage (Rust):
social.rs — social engineering tactics detectionoutput_scanner.rs — output-side content safety scanningmeta_framing.rs — meta-narrative framing attacksargumentation_safety.rs — AAS: adversarial argumentation detection 🆕 Latticeintent_revelation.rs — IRM: deceptive intent revelation 🆕 LatticeStatus: FULLY COVERED (pattern + formal argumentation/intent)
Risk: Agents acting outside intended parameters
SENTINEL Coverage (Rust):
behavioral.rs — behavioral anomaly detectionruntime.rs — dynamic runtime guardrailsgoal_predictability.rs — GPS: goal predictability scoring 🆕 Latticemodel_containment.rs — MIRE: model-irrelevance containment proofs 🆕 Latticetemporal_safety.rs — TSA: LTL property monitoring 🆕 LatticeStatus: FULLY COVERED (pattern + formal containment/predictability)
| Lattice Engine | Primitive | ASI Coverage |
|---|---|---|
| TSA | Temporal Safety Automata | ASI03, ASI06, ASI10 |
| L2 | Capability Proxy + IFC | ASI02, ASI03 |
| AAS | Adversarial Argumentation | ASI06, ASI09 |
| CAFL | Capability-Attenuating Flow | ASI02, ASI08 |
| GPS | Goal Predictability Score | ASI01, ASI10 |
| IRM | Intent Revelation | ASI01, ASI09 |
| MIRE | Model-Irrelevance Containment | ASI07, ASI10 |
| PASR | Provenance-Annotated Reduction | ASI04 |
| shield watchdog | Cascade Monitoring | ASI08 |
| shield circuit_breaker | Failure Isolation | ASI08 |
| immune mTLS + crypto | Agent Authentication | ASI07 |
| immune jail | Process Isolation | ASI05 |
| immune syscall hooks | Privilege Monitoring | ASI03 |
| immune XDR correlator | Attack Propagation | ASI08 |
papers/sentinel-lattice/main.pdfdocs/reference/engines-en.md