🔧

Workflows

OWASP KC2AISVS C9

Defined sequences of agent actions.

Detailed Information
Workflows can be manipulated to bypass security controls or execute unauthorized actions. Reference: OWASP KC2, AISVS C9.
Parent Component
🎛️Orchestration (Control Flow)
Security Implications
Workflows can be manipulated to bypass security controls or execute unauthorized actions. Reference: OWASP KC2, AISVS C9.
Implementation Considerations
Apply appropriate security controls and monitoring based on the parent component's implementation guidance. Reference: OWASP KC2, AISVS C9
🗂️ Framework References