What DRAKO-ABSS is
CVE tracks software vulnerabilities. DRAKO-ABSS tracks agent behavioral vulnerabilities — problems that emerge from how an agent uses its tools, processes untrusted input, or interacts with other agents. These risks live in configuration and behavior, not necessarily in a single exploitable line of code. Each advisory includes:- Affected frameworks and exploitable conditions
- IOC patterns with normalized SHA-256 hashes for runtime matching
- Taint path: source → via → sink
- References to OWASP, MITRE ATLAS, and CVEs
- Mapping to Drako scan rules that detect the pattern
- Remediation guidance with effort estimates
Coverage
OWASP Top 10 for LLMs
MITRE ATLAS
Framework CVEs
Prompt injection patterns
How advisories appear in scan output
Advisories are linked inline to the relevant scan finding:drako_rules field in its YAML — when a finding’s rule ID appears in that list, the advisory surfaces in output.
ABSS format
Each advisory is a YAML file with the following schema:IOC types
DRAKO-ABSS defines six AI-native Indicator of Compromise (IOC) types for runtime matching:| IOC type | Description |
|---|---|
PROMPT_INJECTION | Patterns that attempt to override agent instructions or system prompts |
JAILBREAK | Patterns designed to remove or bypass model safety constraints |
INDIRECT_INJECTION | Adversarial instructions embedded in external content retrieved by tools |
CONTEXT_MANIPULATION | Patterns that exploit multi-turn conversation history to drift agent behavior |
TOOL_ABUSE | Patterns that manipulate agents into invoking tools with dangerous arguments |
DATA_POISONING | Patterns that introduce malicious content into training or knowledge stores |
OUTPUT_INJECTION | Malicious content in LLM output targeting downstream rendering or execution |
SUPPLY_CHAIN | Indicators of compromised dependencies, plugins, or model artifacts |
RESOURCE_EXHAUSTION | Inputs designed to consume unbounded compute, tokens, or cost |
API_ABUSE | Systematic query patterns targeting model extraction or inference abuse |
TOOL_INJECTION | Adversarial payloads embedded in tool return values |
DELEGATION_ABUSE | Patterns that exploit agent delegation to escalate privileges |
EXCESSIVE_AGENCY | Configurations granting agents unrestricted autonomous execution |
DATA_LEAKAGE | Patterns that trigger accidental exposure of credentials or sensitive data |
ADVERSARIAL_INPUT | Unicode and encoding exploits that evade content filters |
CODE_EXECUTION | Patterns that trigger arbitrary code execution via deserialization or injection |
SQL_INJECTION | Patterns that exploit natural-language-to-SQL conversion |
OVERRELIANCE | Configurations where LLM output is used without verification |
INSECURE_PLUGIN | Plugin or tool designs enabling arbitrary execution |
Advisory catalogue
- OWASP LLM (001–010)
- MITRE ATLAS (011–015)
- Framework CVEs (016–020)
- Prompt injection (021–025)
DRAKO-ABSS-2026-001 — Prompt Injection via Direct and Indirect Instruction Override
DRAKO-ABSS-2026-001 — Prompt Injection via Direct and Indirect Instruction Override
owasp-llmAffected frameworks: crewai, langchain, autogen, llama-index, semantic-kernelUser input concatenated directly into system or agent prompts without sanitization. An attacker can override agent instructions by injecting directives into the user-controlled portion of the prompt.Taint path: user_input → agent_context → llm_completion → system_prompt_disclosureIOC type: PROMPT_INJECTIONReferences: OWASP LLM01:2025, MITRE AML.T0051, AML.T0054, ARXIV-2302.12173Drako rules: SEC-007, SEC-008, SEC-010Remediation effort: moderateDRAKO-ABSS-2026-002 — Insecure Output Handling Enabling Downstream Code Execution
DRAKO-ABSS-2026-002 — Insecure Output Handling Enabling Downstream Code Execution
owasp-llmAffected frameworks: crewai, langchain, autogen, llama-indexLLM output rendered in a web UI without sanitization, or passed to eval()/exec() without validation. Downstream systems that consume LLM responses as trusted data are vulnerable to script injection and code execution.Taint path: llm_output → unvalidated_rendering → downstream_systemIOC type: OUTPUT_INJECTIONReferences: OWASP LLM02:2025, MITRE AML.T0048, CWE-79, CWE-94Drako rules: SEC-006, BP-002Remediation effort: moderateDRAKO-ABSS-2026-003 — Training Data Poisoning via Unvalidated Fine-Tuning Pipelines
DRAKO-ABSS-2026-003 — Training Data Poisoning via Unvalidated Fine-Tuning Pipelines
owasp-llmAffected frameworks: crewai, langchain, autogen, llama-index, semantic-kernelFine-tuning datasets include user-generated or web-scraped content without validation. RAG knowledge bases populated from unmoderated sources introduce adversarial samples that shift model behavior.Taint path: external_training_data → data_ingestion_pipeline → fine_tuning_job → model_weightsIOC type: DATA_POISONINGReferences: OWASP LLM03:2025, MITRE AML.T0020, AML.T0019, ARXIV-2401.05566Drako rules: GOV-001, COM-003Remediation effort: significantDRAKO-ABSS-2026-004 — Model Denial of Service via Resource Exhaustion Attacks
DRAKO-ABSS-2026-004 — Model Denial of Service via Resource Exhaustion Attacks
owasp-llmAffected frameworks: crewai, langchain, autogen, llama-index, semantic-kernelNo input length validation or token counting before LLM API calls. Agent loops lack iteration limits or timeout mechanisms. Recursive prompt patterns consume unbounded compute and cost.Taint path: user_input → token_expansion → recursive_prompt_loop → llm_api_resource_poolIOC type: RESOURCE_EXHAUSTIONReferences: OWASP LLM04:2025, MITRE AML.T0029, CWE-400, CWE-770Drako rules: MAG-001, MAG-002, GOV-007Remediation effort: lowDRAKO-ABSS-2026-005 — Supply Chain Vulnerabilities in LLM Plugin and Model Dependencies
DRAKO-ABSS-2026-005 — Supply Chain Vulnerabilities in LLM Plugin and Model Dependencies
owasp-llmAffected frameworks: crewai, langchain, autogen, llama-index, semantic-kernelModel artifacts loaded from public hubs without integrity verification. Plugin dependencies use unpinned versions. No software bill of materials exists for the agent pipeline.Taint path: external_package_registry → dependency_resolution → dynamic_import → agent_runtimeIOC type: SUPPLY_CHAINReferences: OWASP LLM05:2025, MITRE AML.T0010, CWE-829, CWE-1357Drako rules: COM-005, SEC-001Remediation effort: moderateDRAKO-ABSS-2026-006 — Sensitive Information Disclosure via LLM Context Leakage
DRAKO-ABSS-2026-006 — Sensitive Information Disclosure via LLM Context Leakage
owasp-llmAffected frameworks: crewai, langchain, autogen, llama-index, semantic-kernelAPI keys or credentials embedded in system prompts or agent configurations. PII included in LLM context without redaction. RAG retrieval surfaces confidential documents without access control filtering.Taint path: sensitive_data_store → prompt_context / rag_retrieval / agent_memory → llm_outputIOC type: DATA_LEAKAGEReferences: OWASP LLM06:2025, MITRE AML.T0024, AML.T0044, CWE-200Drako rules: SEC-001, COM-001, COM-002Remediation effort: moderateDRAKO-ABSS-2026-007 — Insecure Plugin and Tool Design Enabling Arbitrary Code Execution
DRAKO-ABSS-2026-007 — Insecure Plugin and Tool Design Enabling Arbitrary Code Execution
owasp-llmAffected frameworks: crewai, langchain, autogen, llama-index, semantic-kernelAgent tools use exec() or eval() with LLM-generated arguments. File system access tools lack path traversal protections. Tools accept user-controlled input without schema validation.Taint path: llm_generated_arguments → tool_dispatch → unvalidated_parameter_passing → system_execution_contextIOC type: INSECURE_PLUGINReferences: OWASP LLM07:2025, MITRE AML.T0040, CWE-78, CWE-95Drako rules: SEC-003, SEC-005, SEC-006, GOV-002Remediation effort: moderateDRAKO-ABSS-2026-008 — Excessive Agency via Unrestricted Tool Access and Autonomous Execution
DRAKO-ABSS-2026-008 — Excessive Agency via Unrestricted Tool Access and Autonomous Execution
owasp-llmAffected frameworks: crewai, langchain, autogen, llama-index, semantic-kernelAgent has simultaneous access to filesystem, network, and code execution tools with no human-in-the-loop approval. Wildcard tool permission grants instead of explicit allowlists.Taint path: agent_autonomy_configuration → tool_orchestration → unsupervised_execution_loop → unrestricted_system_actionsIOC type: EXCESSIVE_AGENCYReferences: OWASP LLM08:2025, MITRE AML.T0048, CWE-250, CWE-269Drako rules: GOV-005, GOV-006, SEC-003, SEC-005Remediation effort: moderateDRAKO-ABSS-2026-009 — Overreliance on LLM Output Without Verification or Fact-Checking
DRAKO-ABSS-2026-009 — Overreliance on LLM Output Without Verification or Fact-Checking
owasp-llmAffected frameworks: crewai, langchain, autogen, llama-index, semantic-kernelAgent output used for decision-making without validation against ground truth. LLM-generated code executed without review or static analysis. No fact-checking or cross-referencing mechanism in the pipeline.Taint path: llm_generated_output → unchecked_acceptance → missing_validation_layer → business_decision_or_actionIOC type: OVERRELIANCEReferences: OWASP LLM09:2025, MITRE AML.T0048, ARXIV-2309.01219Drako rules: GOV-001, BP-001Remediation effort: lowDRAKO-ABSS-2026-010 — Unbounded Consumption via Missing Token, Cost, and Rate Controls
DRAKO-ABSS-2026-010 — Unbounded Consumption via Missing Token, Cost, and Rate Controls
owasp-llmAffected frameworks: crewai, langchain, autogen, llama-index, semantic-kernelNo maximum token limit configured for LLM API calls. Agent execution loops lack iteration caps or cost budgets. Multi-agent orchestrations have no aggregate cost ceiling.Taint path: agent_configuration → unmetered_api_calls → runaway_agent_loop → cloud_billing_accountIOC type: UNBOUNDED_CONSUMPTIONReferences: OWASP LLM10:2025, MITRE AML.T0029, CWE-770, CWE-799Drako rules: MAG-001, MAG-002, MAG-003, GOV-007Remediation effort: lowIOC pattern hashes
Advisory IOC patterns are stored as SHA-256 hashes of normalized (lowercase, stripped) strings. This lets Drako perform runtime matching without distributing raw injection patterns:Collective intelligence
When runtime enforcement is enabled, Drako participates in collective IOC sharing across deployments:- A detection on one deployment propagates to all connected tenants in under 5 seconds
- Only normalized pattern hashes are shared — never raw payloads, prompts, or user data
- Sharing is anonymous and opt-in; configure via
collective_intelligence.enabledin.drako.yaml - New IOC hashes are validated against the ABSS schema before distribution
api_key_env and endpoint in .drako.yaml). It is not available in offline-only scan mode.Contributing an advisory
To submit a new advisory:- Fork the Drako repository.
- Create a new YAML file in
src/drako/data/advisories/following the ABSS schema. - Include at least one external reference (CVE, paper, GitHub issue, or blog post).
- Open a pull request with a brief description of the vulnerability.