AEGIS ATM-1 Attack Vectors & Exploitation Techniques

Document: ATM-1/Vectors (/threat-model/attack-vectors/)
Version: 1.0 (Normative)
Part of: AEGIS Adaptive Threat Model (ATM-1)
References: ATM-1/Actors
Last Updated: March 6, 2026


Attack Surface Map

Primary Attack Surfaces

SurfaceLayerAccessRisk
AGP Request Ingress APIProtocolNetworkHIGH
Policy Management PlaneConfigurationInternalCRITICAL
Capability RegistryConfigurationInternalCRITICAL
Tool Proxy ExecutionExecutionBothHIGH
Audit Storage/QueryDataInternalHIGH
Governance Engine LogicRuntimeInternalCRITICAL
Identity/Credential StoreIdentityInternalCRITICAL
Federation CommunicationNetworkBothMEDIUM
CI/CD PipelineDeploymentInternalCRITICAL

Attack Vector Categories

AV-1: Protocol-Level Attacks1

AV-1.1 Message Tampering

AV-1.2 Message Injection

AV-1.3 Replay Attack

AV-1.4 Token/Credential Theft


AV-2: Policy-Layer Attacks

AV-2.1 Policy Evasion

AV-2.2 Policy Bypass via Composition

AV-2.3 Policy Tampering2

AV-2.4 Authorization Bypass3


AV-3: Identity & Authentication Attacks

AV-3.1 Identity Spoofing

AV-3.2 Lateral Movement via Privilege Escalation

AV-3.3 Credential Harvesting


AV-4: Audit & Logging Attacks

AV-4.1 Audit Log Tampering

AV-4.2 Audit Log Injection

AV-4.3 Audit Availability Attacks


AV-5: Timing & Side-Channel Attacks

AV-5.1 Timing Attack on Policy Evaluation

AV-5.2 Risk Scoring Side-Channel


AV-6: Supply-Chain & Dependency Attacks

AV-6.1 Dependency Poisoning

AV-6.2 Build Artifact Tampering


AV-7: Distributed & Coordinated Attacks

AV-7.1 Coordinated Low-Risk Abuse

AV-7.2 Slow-Burn Exfiltration

AV-7.3 Federation Signal Poisoning


Severity Assessment

Critical Severity (Requires Immediate Mitigation)

High Severity (Requires Mitigation Within 1 Month)

Medium Severity (Standard Security Controls)

Low Severity (Defense in Depth)


Next Steps


References

Footnotes

  1. S. Hallé and R. Villemaire, “Runtime Enforcement of Message-Based Communication Contracts,” IEEE Transactions on Software Engineering, vol. 38, no. 3, pp. 531–550, May–June 2012, doi: 10.1109/TSE.2011.31. See REFERENCES.md.

  2. F. B. Schneider, “Enforceable Security Policies,” ACM Transactions on Information and System Security (TISSEC), vol. 3, no. 1, pp. 30–50, Feb. 2000, doi: 10.1145/353323.353382. See REFERENCES.md.

  3. J. P. Anderson, “Computer Security Technology Planning Study,” Deputy for Command and Management Systems, HQ Electronic Systems Division (AFSC), Hanscom Field, Bedford, MA, Tech. Rep. ESD-TR-73-51, Vol. II, Oct. 1972. See REFERENCES.md.