Taking longer than expected.
Reload the pageTaking longer than expected.
Reload the pageWe publish architecture and threat models for the four critical layers of the Secure AI Control Plane. Every model walks through attack paths + the controls that mitigate them, anchored in the OWASP Top 10 for LLM Applications and the NIST AI 600-1 GenAI Profile.
Threat models below are scheduled to publish across Q3-Q4 2026. Subscribe to be notified when each lands.
Prompt injection, jailbreak chains, indirect prompt injection via retrieved documents, data exfiltration via tool-call abuse, system-prompt leakage. Maps each vector to detection + control plane mitigations.
Status
Drafting Q2 2026
Maps to Areebi capabilities
False positive / false negative analysis, redaction integrity, sensitive-pattern detection in adversarial inputs, regex bypass paths, encoding evasion. Threat model walkthrough of detection-to-decision pipeline.
Status
Drafting Q2 2026
Maps to Areebi capabilities
Policy bypass paths, role escalation through edge cases, time-of-check vs time-of-use, conflicting-policy resolution, signed-policy integrity, policy-as-code supply chain.
Status
Drafting Q3 2026
Maps to Areebi capabilities
Immutability guarantees, audit log injection / forging, gap-detection between expected and recorded events, tamper-evident chaining, export integrity for regulator review.
Status
Drafting Q3 2026
Maps to Areebi capabilities
Every CISO evaluating an AI security vendor wants to see the threat model. Most vendors gate it behind sales calls. We don't.
For coordinated disclosure of vulnerabilities, see security.txt.