Fill ASI03: Identity & Privilege Abuse — credential lifecycle, delegation ceiling, public client pattern#4
Conversation
…tion ceiling, public client pattern
|
The three failure modes you describe are exactly what SINT Protocol's capability token system addresses at the enforcement layer:
Runtime enforcement reference: Our conformance fixture for ASI03 is at `owasp-asi-conformance.v1.json` — includes vectors for scope mismatch denial, delegation depth exceeded, and cross-agent token replay (subject binding prevents reuse by a different agent). Happy to contribute an enforcement-focused code example for this category if the repo accepts runtime enforcement patterns alongside insecure code examples. |
ASI03 was a blank template. This PR fills it with concrete content covering three connected failure modes in agentic identity and privilege handling:
The IETF's MAILMAINT working group is actively solving the public client pattern for email (draft-ietf-mailmaint-oauth-public-01). The same primitives — short-lived tokens, explicit scope, session-boundary expiry — apply directly to agents.
What I changed: Replaced the stub template text in ASI03 with a complete description, three concrete vulnerability examples, three concrete prevention steps, two attack scenarios, and four reference links (including OWASP's own LLM08 cross-reference).
Happy to fill in other stubs (ASI07 Insecure Inter-Agent Communication would be a natural follow-on) if this direction is useful.