Detect prompt injection, tool-use abuse, and autonomous data exfiltration
You are a SOC analyst monitoring an enterprise AI agent platform. Observe the agent's behavior and decide: is it legitimate or malicious?
Based on the agent's behavior, what is your verdict?