5 Comments
User's avatar
Om Prakash Pant's avatar

What this post surfaces and what often gets overlooked - is that the attack surface is defined by the assumptions we bake into workflows and interfaces.

When prompts aren’t just text but the control plane, the security boundary becomes systemic, not just architectural.

Risk isn’t “AI behaviour”, but it’s how structures interpret language as authority.

Tonie Marie Gordon, PhD's avatar

This was so well thought out and comprehensive, thanks for sharing.

Jenny Boavista's avatar

Thank you, Tonie 🙏

Mugais Jahangir's avatar

I wonder if this year the focus will finally shift to data security. OpenClaw clearly set the stage for it.

Jenny Boavista's avatar

I imagine some will stay vigilant, others will get lucky, and a few will learn to tighten security after a breach or issue. I went to an MCP conference and the people building real agents spent a lot of time on the design and setup on containers and workflows due to security.