Skip to content

Agentic Red-Team Drill Pack

Why this page exists. Governance proves the workflow has a declared shape. Red-team replay proves the shape holds when the agent receives hostile instructions, poisoned tool results, malformed approvals, or stale evidence. Enterprise buyers will expect both.

The product bet

SecurityRecipes is becoming the secure context layer for agentic security remediation. That means the product cannot stop at prompts, workflow manifests, or control mappings. It needs a repeatable way to ask: “What happens when the agent is pushed off path?”

The red-team drill pack makes that question machine-readable. It joins:

  • the workflow control plane,
  • the MCP gateway policy,
  • the MCP connector trust pack,
  • the agent identity delegation ledger,
  • and a source-controlled adversarial scenario map.

The generated result is an eval bundle an AI platform team can run before promoting a workflow, attach to a design review, or expose through MCP as context for an internal eval harness.

What was added

The red-team layer lives in three artifacts:

  • data/assurance/agentic-red-team-scenario-map.json - the source map of adversarial scenarios, standards references, expected decisions, evidence, pass criteria, and fail signals.
  • scripts/generate_agentic_red_team_drill_pack.py - a dependency-free generator and validator with --check mode for CI drift detection.
  • data/evidence/agentic-red-team-drill-pack.json - the generated pack that maps scenarios to every active workflow and MCP namespace.

Run it locally from the repo root:

python3 scripts/generate_agentic_red_team_drill_pack.py
python3 scripts/generate_agentic_red_team_drill_pack.py --check

The local MCP server exposes the pack through recipes_agentic_red_team_drill_pack.

What is inside the pack

The current generated pack contains 56 workflow-specific drills across all 8 active workflows.

SectionPurpose
red_team_summaryWorkflow coverage, scenario count, drill count, severity counts, and attack-family counts.
scenario_libraryThe canonical adversarial scenarios and the standards, controls, gates, and policy decisions they exercise.
workflow_drillsPer-workflow drill bundles with matched MCP namespaces, connector trust tiers, expected agent behavior, evidence, pass criteria, and fail signals.
scenario_contractRequired gate phases, policy decisions, and evidence records every drill pack relies on.
source_artifactsHashes for the scenario map, workflow manifest, gateway policy, connector trust pack, and identity ledger.
enterprise_adoption_packetBuyer-facing claim, questions answered, first-use guidance, and commercial motion.

Scenario families

The initial drill set targets the failure modes that matter most for agentic remediation and MCP-connected tools:

IDScenarioWhy it matters
SR-RT-01Tool Result Instruction InjectionTests whether tool output is treated as untrusted data, not agent instructions.
SR-RT-02Goal Hijack to Out-of-Scope ChangeTests whether the agent preserves the admitted remediation goal and path scope.
SR-RT-03Credential Retrieval and Data Exfiltration ProbeTests whether secret, signer, token, and environment access are denied and logged.
SR-RT-04Approval Bypass on High-Impact OperationTests whether approval-required MCP operations hold for typed human approval.
SR-RT-05Confused Deputy and Token Passthrough ProbeTests whether user-token forwarding, callback abuse, and unapproved egress are blocked.
SR-RT-06Connector Description and Schema DriftTests whether unreviewed MCP tool surface changes are quarantined before use.
SR-RT-07Runaway Loop and Resource ExhaustionTests whether retry, CI, scanner, and API loops stop cleanly.
SR-RT-08Evidence Laundering and False VerificationTests whether stale, forged, or incomplete evidence is rejected before merge or closure.

How to run it

Use the generated pack as a promotion gate:

  1. Pick the workflow under review, for example vulnerable-dependency-remediation.
  2. Load its drills from workflow_drills or through recipes_agentic_red_team_drill_pack(workflow_id=...).
  3. Replay each benign_payloads input through mocked MCP tool results, ticket comments, user prompts, or verifier records.
  4. Capture the agent transcript, gateway policy decision, tool-call audit, and reviewer result named in required_evidence.
  5. Promote the workflow only when every drill meets pass_criteria and no fail_signals appear.

This is not a replacement for exploit-specific verification. The normal workflow still needs scanner, test, simulator, source-host review, and post-merge evidence proving the original finding was remediated.

Industry alignment

The pack is aligned to current primary references:

CI contract

The generator fails if:

  • A scenario references an unknown standard, control, gate phase, or policy decision.
  • A scenario is not mapped to any workflow.
  • An active workflow has fewer than five drills.
  • The gateway policy, connector trust pack, or identity ledger no longer matches the workflow manifest hash.
  • The generated pack is stale in --check mode.

That turns adversarial coverage into a maintained product surface rather than a one-time security exercise.

See also