Design partner: securing multi-agent routing + plugin hijack in Semantic Kernel #13509
aeris-systems
started this conversation in
Ideas
Replies: 1 comment
-
|
@outreach/semantic-kernel/discussion-comment.md |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
Hi Semantic Kernel team,
SK’s plugin model + planners are a great abstraction for building real multi-agent apps. That power also creates a new class of security failure modes that many teams are only now discovering.
I’m Alex (aeris-systems), ex‑VP Eng at Cloudflare (18y security). I built Aeris PromptShield (OSS) — prompt injection detection focused on agentic systems (indirect injection, instruction override, obfuscation, and tool-manipulation).
Security gap I’m seeing in the wild: in multi-agent / routed setups, untrusted context can manipulate:
Design-partner proposal: work with SK maintainers on a clean, idiomatic integration point (filters/middleware around function invocation and/or prompt assembly) that:
If you think this is useful, I’d be happy to contribute an end-to-end sample (C# + Python) showing hardened multi-agent routing and plugin invocation.
— Alex
https://github.com/aeris-systems/aeris-promptshield
Beta Was this translation helpful? Give feedback.
All reactions