OWASP Agentic Top 10 mapped to Centurian
The OWASP Agentic Top 10 catalogs the 10 most critical security risks for autonomous AI agents. Centurian’s five-product surface maps directly: Connect handles identity and attestation; Govern enforces deterministic Rego rules; Measure runs trajectory eval and anomaly detection; Cost gates runaway spend; Prove writes the bitemporal evidence. Centurian assumes the application is secure (a Noma-style scanner’s job) and governs the operational actions. They run together.
Risk-to-product mapping
| OWASP Risk | Centurian Surface |
|---|---|
| A1 — Prompt Injection | Connect (input policies) + Noma partnership for runtime blocking |
| A2 — Insecure Tool Use | Govern (Rego rules + tool allowlists) + step-up MFA on high-privilege actions |
| A3 — Excessive Autonomy | Govern (registration tiers, Autonomous-Narrow Default-OFF, kill switch SLO 30s) |
| A4 — Untrusted Model Outputs | Measure (trajectory eval, deterministic checks) + Govern (output policies) |
| A5 — Identity Spoofing | Connect (registration, attestation, ephemeral 5s-TTL credentials, signed) |
| A6 — Sensitive Data Leakage | Govern (PII export rules) + Measure (trajectory anomaly detection) |
| A7 — Supply-Chain Risk | Connect (platform integration adapters, signed artifact catalog) |
| A8 — Denial-of-Service / Runaway Cost | Cost (multi-rail per-agent budgets, hard stops at rail layer, $5/mo free-tier cap) |
| A9 — Evaluation Gaps | Measure (4 eval acquisition paths + active prompts at 14d + periodic audit) |
| A10 — Audit-Trail Tampering | Prove (bitemporal evidence, Ed25519, append-only spine, sampled verification) |
Where Centurian stops + a security scanner starts
Centurian assumes the underlying application is secure and governs the operational actions and spending. Runtime threat protection — prompt-injection blocking, jailbreak detection, shadow-MCP-server discovery — is the job of a security scanner like Noma Security. The two are complementary: Centurian logs actions in a court-defensible chain; Noma blocks attacks. Centurian ingests Noma alerts as a source so a single audit covers both.
FAQ
First agent free, forever · No credit card