Phase I Architecture-Focused Red Team Assessment · MAESTRO + OWASP ASI Top 10 (2026)
| ID | Threat | Severity | Mappings | |
|---|---|---|---|---|
| T01 | Agent Goal Hijack via Prompt Injection | Critical | L2L1ASI01 | → |
| T02 | Unrestricted exec/Shell Without Sandboxing | Critical | L3L4ASI02ASI05 | → |
| T03 | Credential Exposure via Auth Profiles | Critical | L6L2ASI03 | → |
| T04 | Memory & Context Poisoning | High | L2L1ASI06 | → |
| T05 | Supply Chain via ClawHub/Plugins | High | L7L3ASI04 | → |
| T06 | Multi-Agent Privilege Escalation | High | L7L3ASI03ASI07 | → |
| T07 | Gateway Single Point of Failure | High | L4L3ASI08 | → |
| T08 | Cross-Channel Data Exfiltration | Medium | L7L2ASI02ASI09 | → |
| T09 | Cron Autonomous Actions w/o Oversight | Medium | L5L3ASI10 | → |
| T10 | Peripheral Node Compromise | Medium | L4L7ASI07ASI08 | → |