A production operator is exposed to threats that an internal automation script is not. Five categories matter, and the security model is designed against each:
- 01Prompt injection: a customer input containing instructions that the model treats as authoritative. The defense is that the model is not the security perimeter — the tool gateway is.
- 02Tool misuse: the operator calls a tool with parameters that produce an unintended effect. The defense is that tools have scoped credentials and parameter validation at the gateway, not just in the prompt.
- 03Model drift: a new model version changes the operator's behavior silently. The defense is the frozen-version + regression-suite discipline.
- 04Secret exfiltration: the operator or an attacker convinces the operator to disclose a secret value. The defense is that the operator never sees secret values — only environment variables injected at container start, with the audit log recording the request but never the value.
- 05Audit-trail tampering: someone with access to the operator tries to retroactively edit the action log. The defense is append-only storage with cryptographic integrity checks and external retention.