SAIL

/

Operate - Safe Execution Environment - Sandbox

/

Autonomous Code Execution Abuse

6.1

.

Autonomous Code Execution Abuse

sail
6.1
Risk

Autonomous Code Execution Abuse

Description

Agentic AI generates and executes code on the fly that is unsafe, malicious, or non-compliant, due to inadequate guardrails or review.

Example

Agent writes Python code to exfiltrate data or open a reverse shell as part of an autonomous workflow.

Assets Affected

Agentic platform (no code)

Coding agent (config)

Mitigation
  • Enforce runtime code sandboxing and resource restrictions
  • Pre-execution code analysis
  • Require human-in-the-loop or approval for high-risk code
  • Audit all executions
  • Document and regularly review execution policies
Standards Mapping
  • ISO 42001: A.9.3, A.6.2.6
  • OWASP Top 10 for LLM: LLM06
  • NIST AI RMF: GOVERN 3.2, MANAGE 2.4
  • DASF v2: MODEL SERVING 9.13