Skip to content

Threat Model

TapPass sits between AI agents and LLMs/tools. The primary threats:

ThreatVectorMitigation
Prompt injectionDirect and indirect (via tool results)detect_injection (5-category), scan_tool_results (10 patterns)
Data exfiltrationPaste services, DNS tunneling, webhooksdetect_exfiltration, taint_check, exfil blocklist (60+ domains)
Memory poisoningMEMORY.md writes, identity overridedetect_memory_poison (6 categories)
Insider threatSelf-preservation, deception, unauthorized sharingdetect_insider_threat (7 categories, session-aware)
Tool poisoningMalicious tool descriptionsdetect_tool_poison, tool integrity (SHA-256 hashing)
Credential theftReading SSH keys, cloud credsForbidden zones (74 paths), trust tiers, credential monitor
Privilege escalationsudo, admin overridedetect_escalation (4-stage), dangerous command database
PII leakageSSNs, credit cards in responses4-layer PII detection (Presidio + regex + normalizer + output scan)
LayerMechanism
IdentitySPIFFE mTLS: no API keys, certificate-based
PolicyOPA/Rego: externalized, auditable, fail-closed
Input scan49-step pipeline with single-pass scanner
ExecutionCapability tokens, tool constraints, approval gate
Output scanDLP, taint tracking, shell bleed detection
SandboxKernel-level isolation (nono), forbidden zones, trust tiers
AuditSHA-256 hash-chained trail, SIEM export

119 adversarial attacks, 0 bypasses. See the Red Team Report.

Full ASI01–ASI10 coverage. See the OWASP mapping.

14 of 17 MCP attack categories blocked (vs 1-2/17 for Claude Desktop). See the MCPSecBench matrix.