Skip to content

research(security): formal 4-property security model for Zeph — Task/Action/Source/Data alignment audit (arXiv:2603.19469) #2417

@bug-ops

Description

@bug-ops

Finding

A Framework for Formalizing LLM Agent Security (arXiv:2603.19469)

Defines four security properties:

  1. Task Alignment — agent actions serve the user's stated goal
  2. Action Alignment — each action matches the agent's internal plan
  3. Source Authorization — tool calls are authorized by a trusted source
  4. Data Isolation — workspace data does not leak to untrusted outputs

Formalizes prompt injection, jailbreak, task drift, memory poisoning as violations of these properties.

Applicability to Zeph

Zeph has ExfiltrationGuard, ContentSanitizer, ExfiltrationGuard, and PromptInjectionDetector but no formal model mapping these to security properties. A property-based audit would identify which invariants are enforced and which are not.

Gaps identified:

  • Source Authorization for MCP tool calls: Zeph has trust levels for MCP servers but no per-call authorization check against the originating source (user vs. tool output vs. memory)
  • Data Isolation between workspace and untrusted tool outputs: QuarantinedSummarizer addresses this partially, but the formal property (no path from untrusted tool output to workspace write without sanitization) is not enforced end-to-end

Proposed action

  1. Map each of Zeph's security components to the 4 properties
  2. Identify unaddressed paths (especially Source Authorization for MCP)
  3. File targeted bug/enhancement issues for each gap

Source

  • arXiv:2603.19469 — A Framework for Formalizing LLM Agent Security

Metadata

Metadata

Assignees

Labels

P2High value, medium complexityresearchResearch-driven improvementsecuritySecurity-related issue

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions