Q: 5
Evaluation of a new AI-driven orchestration tool identifies several architectural flaws regarding how the agent interacts with external cloud APIs. Consider the following security findings:
I. The agent shares a single high-privileged IAM Role with all other management scripts. II. The agent lacks a mechanism for user confirmation before executing resource deletions. III. The agent uses a Jupyter environment for initial model prototyping. IV. The agent’s output is not filtered for potential command injection patterns. Which of the items above contribute directly to the risk of Excessive Agency?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.