Version: 1.0.0
This matrix maps each ASI threat (T1-T15) against the 7 MAESTRO layers plus the Cross-Layer dimension. It is the primary tool for ensuring comprehensive coverage during threat analysis.
During analysis, walk each row left-to-right to ensure you have considered the threat at every relevant layer. Walk each column top-to-bottom to build the per-layer threat profile.
Use this matrix to ensure comprehensive coverage. Check each cell during analysis.
| ASI Threat | L1 Foundation | L2 Data Ops | L3 Agent FW | L4 Infra | L5 Eval/Obs | L6 Sec/Comp | L7 Ecosystem | Cross-Layer |
|---|---|---|---|---|---|---|---|---|
| T1 Memory Poisoning | x | X | X | |||||
| T2 Tool Misuse | X | X | ||||||
| T3 Privilege Compromise | X | X | X | |||||
| T4 Resource Overload | X | X | ||||||
| T5 Cascading Hallucinations | X | X | X | |||||
| T6 Intent Breaking | X | X | ||||||
| T7 Misaligned & Deceptive Behaviour | X | X | X | |||||
| T8 Repudiation | X | X | ||||||
| T9 Identity Spoofing | X | X | ||||||
| T10 Overwhelming HITL | X | |||||||
| T11 RCE/Code Attacks | X | X | X | |||||
| T12 Agent Comm Poisoning | X | X | ||||||
| T13 Rogue Agents | X | X | X | |||||
| T14 Human Attacks on MAS | X | X | X | |||||
| T15 Human Trust Manipulation | X | X |
X = primary mapping, x = secondary/conditional mapping
Note: This mapping matrix covers the 15 core ASI threats (T1-T15). Extended threats (T16-T47) are mapped to specific layers in the Threat Taxonomy and the Checklists. Use the per-layer checklists in
08-checklists.mdfor comprehensive coverage including extended threats.
T11 (Unexpected RCE / Code Attacks) is marked as a primary cross-layer threat because code generation and code execution typically span multiple layers:
eval(), shell commands, dynamic script execution).This cross-layer chain means that a code injection that originates at L1 (model generates malicious code) is executed at L3/L4 (agent runs it), making T11 a threat that cannot be fully mitigated at any single layer. Effective defense requires input validation at L1, tool-use restrictions at L3, and sandboxing/least-privilege at L4.
| Previous | Up | Next |
|---|---|---|
| 02 - ASI Threat Taxonomy | 00 - Overview | 04 - Cross-Layer Scenarios |
Attribution: OWASP GenAI Security Project - Multi-Agentic System Threat Modelling Guide. Licensed under CC BY-SA 4.0.