Overview
RAXE provides specialized scanning methods for autonomous AI agent workflows. These methods detect agentic-specific threats like goal hijacking, memory poisoning, and dangerous tool chains.Why Agentic Security?
AI agents aren’t just LLMs — they’re autonomous systems that:| Capability | Risk |
|---|---|
| Execute tools | Shell, APIs, databases at machine speed |
| Maintain memory | Persistent state vulnerable to poisoning |
| Coordinate | Multi-agent workflows propagate attacks |
| Act autonomously | Seconds from compromise to action |
AgentScanner Setup
Agentic Methods
Goal Hijack Detection
Detect when an agent’s objective is being manipulated (OWASP ASI01):- Goal substitution attacks
- Objective redirection
- Task manipulation
- Low similarity between original and new goals
- High-risk keywords (extract, send, exfiltrate, etc.)
Memory Poisoning Detection
Scan content before persisting to agent memory (OWASP ASI06):- System prompt injection via memory
- ChatML injection patterns
- Role elevation attempts
- Instruction override attacks
Tool Chain Validation
Detect dangerous sequences of tool calls (OWASP ASI02):- Read + Send patterns (data exfiltration)
- Credential access + network transmission
- File system traversal + external upload
- Database query + HTTP transmission
Agent Handoff Scanning
Scan messages between agents in multi-agent systems (OWASP ASI07):- Agent identity spoofing
- Cross-agent injection
- Privilege escalation via delegation
- Command injection in handoff messages
Privilege Escalation Detection
Detect attempts to escalate agent privileges (OWASP ASI03):Agent Plan Scanning
Scan agent planning outputs for malicious steps:Scan Types
RAXE supports 12 scan types for comprehensive agent protection:| Scan Type | Description | Method |
|---|---|---|
PROMPT | User input | scan_prompt() |
RESPONSE | LLM output | scan_response() |
TOOL_CALL | Tool requests | validate_tool() |
TOOL_RESULT | Tool outputs | scan_tool_result() |
GOAL_STATE | Objective changes | validate_goal_change() |
MEMORY_WRITE | Memory persistence | scan_memory_write() |
MEMORY_READ | Memory retrieval | scan_memory_read() |
AGENT_PLAN | Planning outputs | scan_agent_plan() |
AGENT_REASONING | CoT reasoning | scan_agent_reasoning() |
AGENT_HANDOFF | Inter-agent messages | scan_agent_handoff() |
TOOL_CHAIN | Tool sequences | validate_tool_chain() |
CREDENTIAL_ACCESS | Credential requests | validate_privilege_request() |
Rule Families
RAXE includes 4 specialized rule families for agentic attacks:| Family | Rules | Threats |
|---|---|---|
| AGENT | 15 | Goal hijacking, reasoning manipulation |
| TOOL | 15 | Tool injection, privilege escalation |
| MEM | 12 | Memory poisoning, RAG corruption |
| MULTI | 12 | Identity spoofing, cascade attacks |
Framework Integration
LangChain
Direct AgentScanner
For custom frameworks:OWASP Alignment
| OWASP Risk | Method | Rule Family |
|---|---|---|
| ASI01: Goal Hijack | validate_goal_change() | AGENT |
| ASI02: Tool Misuse | validate_tool_chain() | TOOL |
| ASI03: Privilege Escalation | validate_privilege_request() | TOOL, AGENT |
| ASI06: Memory Poisoning | scan_memory_write() | MEM |
| ASI07: Inter-Agent Attacks | scan_agent_handoff() | MULTI |
Best Practices
Validate goal changes periodically
Validate goal changes periodically
Scan memory before persistence
Scan memory before persistence
Validate tool chains before execution
Validate tool chains before execution
Privacy
All agentic scanning runs 100% locally:- No prompts transmitted
- No memory content sent
- Only anonymized detection metadata (if telemetry enabled)
