G360 Technologies

The Engineering Room

The Engineering Room

AI Agents Broke the Old Security Model. AI-SPM…

AI Agents Broke the Old Security Model. AI-SPM Is the First Attempt at Catching Up. A workflow agent is deployed to summarize inbound emails, pull relevant policy snippets from an internal knowledge base, and open a ticket when it detects a compliance issue. It works well until an external email includes hidden instructions that influence the agent’s tool calls. The model did not change. The agent’s access, tools, and data paths did. Enterprise AI agents are shifting risk from the model layer to the system layer: tools, identities, data connectors, orchestration, and runtime controls. In response, vendors are shipping AI Security Posture Management (AI-SPM) capabilities that aim to inventory agent architectures and prioritize risk based on how agents can act and what they can reach. (Microsoft) Agents are not just chat interfaces. They are software systems that combine a model, an orchestration framework, tool integrations, data retrieval pipelines, and an execution environment. In practice, a single “agent” is closer to a mini application than a standalone model endpoint. This shift is visible in vendor security guidance and platform releases. Microsoft’s Security blog frames agent posture as comprehensive visibility into “all AI assets” and the context around what each agent can do and what it is connected to. (Microsoft) Microsoft Defender for Cloud has also expanded AI-SPM coverage to include GCP Vertex AI, signaling multi-cloud posture expectations rather than single-platform governance. (Microsoft Learn) At the same time, cloud platforms are standardizing agent runtime building blocks. AWS documentation describes Amazon Bedrock AgentCore as modular services such as runtime, memory, gateway, and observability, with OpenTelemetry and CloudWatch-based tracing and dashboards. (AWS Documentation) On the governance side, the Cloud Security Alliance’s MAESTRO framework explicitly treats agentic systems as multi-layer environments where cross-layer interactions drive risk propagation. (Cloud Security Alliance) How the Mechanism Works  AI-SPM is best understood as a posture layer that tries to answer four questions continuously: Technically, many of these risks become visible only when you treat the agent as an execution path. Observability tooling for agent runtimes is increasingly built around tracing tool calls, state transitions, and execution metrics. AWS AgentCore observability documentation describes dashboards and traces across AgentCore resources and integration with OpenTelemetry. (AWS Documentation) Finally, tool standardization is tightening. The Model Context Protocol (MCP) specification added OAuth-aligned authorization requirements, including explicit resource indicators (RFC 8707), which specify exactly which backend resource a token can access. The goal is to reduce token misuse and confused deputy-style failures when connecting clients to tool servers. (Auth0) Analysis: Why This Matters Now The underlying change is that “AI risk” is less about what the model might say and more about what the system might do. Consider a multi-agent expense workflow. A coordinator agent receives requests, a validation agent checks policy compliance, and an execution agent submits approved payments to the finance system. Each agent has narrow permissions. But if the coordinator is compromised through indirect prompt injection (say, a malicious invoice PDF with hidden instructions), it can route fraudulent requests to the execution agent with fabricated approval flags. No single agent exceeded its permissions. The system did exactly what it was told. The breach happened in the orchestration logic, not the model. Agent deployments turn natural language into action. That action is mediated by: This shifts security ownership. Model governance teams can no longer carry agent risk alone. Platform engineering owns runtimes and identity integration, security engineering owns detection and response hooks, and governance teams own evidence and control design. It also changes what “posture” means. Traditional CSPM and identity posture focus on static resources and permissions. Agents introduce dynamic execution: the same permission set becomes higher risk when paired with autonomy and untrusted inputs, especially when tool chains span multiple systems. What This Looks Like in Practice A security team opens their AI-SPM dashboard on Monday morning. They see: The finding is not that the agent has a vulnerability. The finding is that this combination of autonomy, tool access, and external input exposure creates a high-value target. The remediation options are architectural: add an approval workflow for refunds, restrict external input processing, or tighten retrieval-time access controls. This is the shift AI-SPM represents. Risk is not a CVE to patch. Risk is a configuration and capability profile to govern. Implications for Enterprises Operational implications Technical implications Risks and Open Questions AI-SPM addresses visibility gaps, but several failure modes remain structurally unsolved. Further Reading

The Engineering Room

The Prompt Is the Bug

The Prompt Is the Bug How MLflow 3.x brings version control to GenAI’s invisible failure points A customer support agent powered by an LLM starts returning inconsistent recommendations. The model version has not changed. The retrieval index looks intact. The only modification was a small prompt update deployed earlier that day. Without prompt versioning and traceability, the team spends hours hunting through deployment logs, Slack threads, and git commits trying to reconstruct what changed. By the time they find the culprit, the damage is done: confused customers, escalated tickets, and a rollback that takes longer than the original deploy. MLflow 3.x expands traditional model tracking into a GenAI-native observability and governance layer. Prompts, system messages, traces, evaluations, and human feedback are now treated as first-class, versioned artifacts tied directly to experiments and deployments. This matters because production LLM failures rarely come from the model. They come from everything around it. Classic MLOps tools were built for a simpler world: trained models, static datasets, numerical metrics. In that world, you could trace a failure back to a model version or a data issue. LLM applications break this assumption. Behavior is shaped just as much by prompts, system instructions, retrieval logic, and tool orchestration. A two-word change to a system message can shift tone. A prompt reordering can break downstream parsing. A retrieval tweak can surface stale content that the model confidently presents as fact. As enterprises deploy LLMs into customer support, internal copilots, and decision-support workflows, these non-model components become the primary source of production incidents. And without structured tracking, they leave no trace. MLflow 3.x extends the platform from model tracking into full GenAI application lifecycle management by making these invisible components visible. What Could Go Wrong (and often does) Consider two scenarios that MLflow 3.x is designed to catch: The phantom prompt edit. A product manager tweaks the system message to make responses “friendlier.” No code review, no deployment flag. Two days later, the bot starts agreeing with customer complaints about pricing, offering unauthorized discounts in vague language. Without prompt versioning, the connection between the edit and the behavior is invisible. The retrieval drift. A knowledge base update adds new product documentation. The retrieval index now surfaces newer content, but the prompt was tuned for the old structure. Responses become inconsistent, sometimes mixing outdated and current information in the same answer. Nothing in the model or prompt changed, but the system behaves differently. A related failure mode: human reviewers flag bad responses, but those flags never connect back to specific prompt versions or retrieval configurations. When the team investigates weeks later, they cannot reconstruct which system state produced the flagged outputs. Each of these failures stems from missing system-level traceability, even though they often surface later as governance or compliance issues. How The Mechanism Works MLflow 3.x introduces several GenAI-specific capabilities that integrate with its existing experiment and registry model. Tracing and observability MLflow Tracing captures inputs, outputs, and metadata for each step in a GenAI workflow, including LLM calls, tool invocations, and agent decisions. Traces are structured as sessions and spans, logged asynchronously for production use, and linked to the exact application version that produced them. Tracing is OpenTelemetry-compatible, allowing export into enterprise observability stacks. Prompt Registry Prompts are stored as versioned registry artifacts with content, parameters, and metadata. Each version can be searched, compared, rolled back, or evaluated. Prompts appear directly in the MLflow UI and can be filtered across experiments and traces by version or content. System messages and feedback as trace data Conversational elements such as user prompts, system messages, and tool calls are recorded as structured trace events. Human feedback and annotations attach directly to traces with metadata including author and timestamp, allowing quality labels to feed evaluation datasets. LoggedModel for GenAI applications The LoggedModel abstraction snapshots the full GenAI application configuration, including the model, prompts, retrieval logic, rerankers, and settings. All production traces, metrics, and feedback tie back to a specific LoggedModel version, enabling precise auditing and reproducibility. Evaluation integration MLflow GenAI Evaluation APIs allow prompts and models to be evaluated across datasets using built-in or custom judge metrics, including LLM-as-a-judge. Evaluation results, traces, and scores are logged to MLflow Experiments and associated with specific prompt and application versions. Analysis: Why This Matters Now LLM systems fail differently than traditional software. The failure modes are subtle, the causes are distributed, and the evidence is ephemeral. A prompt tweak can change output structure. A system message edit can alter tone or safety behavior. A retrieval change can surface outdated content. None of these show up in traditional monitoring. None of them trigger alerts. The system looks healthy until a customer complains, a regulator asks questions, or an output goes viral for the wrong reasons. Without artifact-level versioning, organizations cannot reliably answer basic operational questions: what changed, when it changed, and which deployment produced a specific response. MLflow 3.x addresses this by making prompts and traces as inspectable and reproducible as model binaries. This also compresses incident response from hours to minutes. When a problematic output appears, teams can trace it back to the exact prompt version, configuration, and application snapshot. No more inferring behavior from logs. No more re-running tests and hoping to reproduce the issue. Implications For Enterprises For operations teams: Deterministic replay becomes possible. Pair a prompt version with an application version and a model version, and you can reconstruct exactly what the system would have done. Rollbacks become configuration changes rather than emergency code redeploys. Production incidents can be converted into permanent regression tests by exporting and annotating traces. For security and governance teams: Tracing data can function as an audit log input when integrated with enterprise logging and retention controls. Prompt and application versioning supports approval workflows, human-in-the-loop reviews, and post-incident analysis. PII redaction and OpenTelemetry export enable integration with SIEM, logging, and GRC systems. When a regulator asks “what did your system say and why,” teams have structured evidence to work from rather than manual reconstruction. For platform architects: MLflow unifies traditional ML and GenAI governance under a