Securing Autonomous AI Agents with TrendAI & NVIDIA OpenShell
The article outlines the emerging security risks associated with autonomous Agentic AI and presents a collaborative architectural solution between TrendAI and NVIDIA. By integrating TrendAI's governance and behavioral analysis with NVIDIA's OpenShell runtime, enterprises can safely deploy self-evolving AI agents with runtime policy enforcement and protection against AI-native threats like prompt injection.
Authors: Fernando Cardoso, King Cao, Truman Coburn, Bestin Koruthu
Source:Trend Micro
Key Takeaways
- Agentic AI introduces new attack surfaces by allowing AI to persist, invoke tools, and execute code autonomously, moving risk beyond just inference time.
- NVIDIA OpenShell provides a foundational runtime with sandboxed execution, local memory, and file system isolation for AI agents.
- TrendAI integrates with OpenShell to provide runtime policy enforcement, dynamic behavioral analysis, and continuous agentic scanning.
- AI-native attacks like prompt injection and indirect prompt manipulation require continuous monitoring and inline security controls to prevent unauthorized actions and data leakage.
Affected Systems
- Agentic AI systems
- NVIDIA OpenShell
- Large Language Models (LLMs)
Attack Chain
Threat actors target autonomous AI agents using AI-native attacks such as prompt injection and indirect prompt manipulation. If successful, these attacks manipulate the agent's decision logic, leading to unauthorized tool invocation, sensitive data leakage, or malicious code execution within the agent's environment. The attack surface extends across the agent's skills, memory, and execution paths, requiring dynamic runtime enforcement to disrupt the chain.
Detection Availability
- YARA Rules: No
- Sigma Rules: No
- Snort/Suricata Rules: No
- KQL Queries: No
- Splunk SPL Queries: No
- EQL Queries: No
- Other Detection Logic: No
The article discusses architectural security controls and dynamic analysis capabilities provided by TrendAI and NVIDIA OpenShell, but does not provide specific detection rules or queries.
Detection Engineering Assessment
EDR Visibility: Medium — EDR can monitor the underlying host running the OpenShell environment for anomalous file or network activity, but may lack visibility into the specific AI agent memory or prompt interactions. Network Visibility: Medium — Network monitoring can detect anomalous API calls or unauthorized external connections made by AI agents, but encrypted API traffic to external LLMs may obscure payload details. Detection Difficulty: Hard — Detecting malicious intent within AI agent behavior requires understanding the context of the prompts and the expected baseline of the agent's autonomous actions, which is highly dynamic.
Required Log Sources
- AI Application Logs
- API Gateway Logs
- Container/Sandbox Logs
Hunting Hypotheses
| Hypothesis | Telemetry | ATT&CK Stage | FP Risk |
|---|---|---|---|
| An AI agent invokes an unapproved Model Context Protocol (MCP) service or tool outside its declared scope. | Application/Sandbox logs monitoring tool invocation. | Execution | Medium |
| An AI agent attempts to access or exfiltrate sensitive data from connected enterprise repositories (e.g., Office 365, GitHub) in an anomalous pattern. | API Gateway Logs, Enterprise Application Audit Logs | Collection | High |
Control Gaps
- Lack of visibility into autonomous agent memory
- Inability to inspect dynamic prompt generation at runtime without specialized AI security tools
Key Behavioral Indicators
- Anomalous tool invocation
- Unexpected external network connections from agent sandboxes
- Deviations from declared skill behavior
Recommendations
Immediate Mitigation
- Inventory all deployed AI agents and their accessible tools/skills.
- Implement sandboxed execution environments for AI agents.
Infrastructure Hardening
- Deploy runtime policy enforcement to restrict agent tool invocation to approved lists.
- Isolate agent local memory and file systems from critical enterprise infrastructure.
User Protection
- Implement strict access controls and authentication for interacting with AI agents.
Security Awareness
- Educate development teams on AI-native threats such as prompt injection and indirect prompt manipulation.
MITRE ATT&CK Mapping
- T1190 - Exploit Public-Facing Application
- T1059 - Command and Scripting Interpreter