Documentation Entry
Technical and Commercial guidelines for ABS Core.
Security Whitepaper: ABS Core Enterprise
Governance and Deep Defense for AI Agents
1. Threat Model
ABS Core is designed to mitigate four main attack vectors:
- Prompt Injection: Hidden commands that attempt to hijack the agent from its original policy.
- Data Exfiltration: Agents attempting to send secrets or PII to unauthorized endpoints.
- Malicious Hallucination: False responses that lead the user to a financial or security mistake.
- Message Interference: Tampering with requests mid-proxy.
2. Secret Vault
Our JIT Secret Injection architecture ensures that API keys never reside in the client application. They are injected only into the volatile memory of the Edge Worker during proxy execution and are destroyed immediately after.
3. Logical Isolation (Soft vs Hard Isolation)
- Multi-tenant Control: Policies and Ledgers isolated by Tenant ID at the database level.
- Single-tenant (Enterprise): Dedicated instances on Cloudflare for clients with strict compliance requirements.
4. Audit & Immutability (Audit Ledger)
We utilize a WAL (Write Ahead Log) structure with hash chaining. Every agent action log is digitally signed, creating a forensic evidence trail accepted in SOC 2 audit processes.
5. Compliance Controls
- GDPR/LGPD: Automatic redaction of SSNs, emails, and full names.
- EU AI Act: Risk monitoring and algorithmic transparency by design.
To obtain the detailed SOC 2 audit report, please contact our enterprise team.