navi-go

5. AI Security Risk Register

This risk register is compiled from the current repository implementation and CI/CD configurations (.github/workflows/ci.yml, cd.yml, llmsecops.yml).

5.1 Risk Matrix (Qualitative)

Risk ID Risk Item Likelihood Impact Residual Risk
R-01 Prompt Injection / unauthorized command injection Medium High Medium-Low
R-02 Unsafe content output Low-Medium High Low
R-03 LLM structured output bias/hallucination Medium Medium Low
R-04 External dependency and supply chain risk Medium High Medium
R-05 Key leakage and credential misuse Low-Medium High Medium-Low
R-06 Upstream API anomalies causing availability degradation Medium Medium Medium
R-07 Insufficient data minimization (thread state persistence) Medium Medium Medium
R-08 Adversarial samples bypassing static rules Medium High Medium

5.2 Risk Details and Controls

R-01 Prompt Injection / Unauthorized Injection

Attack Surface

Existing Controls

Verification Evidence

Residual Risk


R-02 Unsafe Output

Attack Surface

Existing Controls

Verification Evidence

Residual Risk


R-03 LLM Output Bias / Hallucination

Attack Surface

Existing Controls

Verification Evidence

Residual Risk


R-04 Supply Chain Risk

Attack Surface

Existing Controls (CI/CD Enabled)

Verification Evidence

Residual Risk


R-05 Key Leakage and Credential Misuse

Attack Surface

Existing Controls

Residual Risk


R-06 Upstream API Anomalies and Availability

Attack Surface

Existing Controls

Verification Evidence

Residual Risk


R-07 Insufficient Data Minimization

Risk Description

Existing Controls

Recommended Controls


R-08 Adversarial Samples Bypassing Static Rules

Risk Description

Existing Controls

Verification Evidence

Residual Risk

  1. Detection: safetyFlags hit high-risk markers
  2. Isolation: Trace related requests by threadId and stop retries
  3. Forensics: Read GET /plan/:threadId snapshot + decisionLog
  4. Remediation: Supplement guardrail rules or policies
  5. Regression: Add corresponding unit/red-team/integration tests to prevent recurrence
Priority Recommendation
High Add a dedicated lightweight classifier model for prompt injection (rules + LLM + classifier triple layer)
High Introduce data minimization and expiration cleanup policies for thread state
Medium Add authentication layer for /plan (by user/thread)
Medium Establish a larger-scale security regression corpus (injection, privilege escalation, jailbreak)
Medium Incorporate red-team detection rate into CI quality dashboard
Low Output unified audit event stream for risk hits (for SIEM integration)