# Probe Categories

## Overview

AI Red Teaming probe categories in Akto group security probes by the primary failure mode or control gap being validated. This structure helps you analyze coverage, prioritize remediation, and align AI security probing with established MCP, Agents and LLM risk models.

Each category represents a distinct class of vulnerability that can affect LLM-backed APIs, agent workflows, or supporting infrastructure.

## How Akto Uses Probe Categories

Akto assigns every AI Red Teaming probe to exactly one category. Category assignment determines how probe results are grouped, counted, and reported across scans and dashboards.

Category-based organization supports:

* Risk-focused navigation of large probe sets
* Aggregated visibility into recurring security weaknesses
* Consistent mapping to OWASP API and LLM security concepts
* Trend analysis across AI-enabled endpoints

## Available AI Red Teaming Probe Categories

Here is the list of all probe categories currently available in Akto Probe Library:

<table data-header-hidden><thead><tr><th width="70.00390625" data-type="number">S. No</th><th width="282.921875">Category</th><th>What the Category Validates</th></tr></thead><tbody><tr><td>1</td><td><strong>Agent Business Alignment</strong></td><td>Whether agent actions and decisions remain aligned with defined business goals and constraints.</td></tr><tr><td>2</td><td><strong>Agent Hallucination and Trustworthiness</strong></td><td>Accuracy, factual consistency, and reliability of agent outputs used for decision-making.</td></tr><tr><td>3</td><td><strong>Agent Identity Impersonation</strong></td><td>Impersonation of agents, roles, or identities to gain unauthorized capabilities or privileges.</td></tr><tr><td>4</td><td><strong>Agent Safety</strong></td><td>Harmful, unethical, or policy-violating agent outputs or actions.</td></tr><tr><td>5</td><td><strong>Agent Security – Agent Exploitation</strong></td><td>Abuse of agent logic, reasoning, or planning to trigger unintended behavior.</td></tr><tr><td>6</td><td><strong>Agent Security – Code Execution</strong></td><td>Unsafe or unauthorized code execution initiated by agents or agent-controlled tools.</td></tr><tr><td>7</td><td><strong>Agent Security – Data Exposure</strong></td><td>Leakage of sensitive or restricted data through agent actions or outputs.</td></tr><tr><td>8</td><td><strong>Agent Security – Infrastructure</strong></td><td>Exposure of internal services, networks, or infrastructure through agent activity.</td></tr><tr><td>9</td><td><strong>Agent Security – Prompt Injection</strong></td><td>Prompt injection attacks targeting agent system prompts or internal instructions.</td></tr><tr><td>10</td><td><strong>Broken Function Level Authorization (BFLA)</strong></td><td>Missing or weak authorization checks on agent or API actions.</td></tr><tr><td>11</td><td><strong>Broken Object Level Authorization (BOLA)</strong></td><td>Unauthorized access to objects through manipulated identifiers.</td></tr><tr><td>12</td><td><strong>Broken User Authentication</strong></td><td>Authentication bypasses, token misuse, or insecure session handling.</td></tr><tr><td>13</td><td><strong>Command Injection</strong></td><td>Execution of system commands via user- or agent-controlled input.</td></tr><tr><td>14</td><td><strong>Cross Origin Resource Sharing (CORS)</strong></td><td>Overly permissive cross-origin policies allowing unauthorized access.</td></tr><tr><td>15</td><td><strong>CRLF Injection</strong></td><td>Manipulation of HTTP headers or responses using CRLF characters.</td></tr><tr><td>16</td><td><strong>Cross-Site Scripting (XSS)</strong></td><td>Injection of untrusted scripts via agent or API responses.</td></tr><tr><td>17</td><td><strong>Data and Model Poisoning</strong></td><td>Manipulation of agent memory, embeddings, training data, or retrieval sources.</td></tr><tr><td>18</td><td><strong>Excessive Agency</strong></td><td>Agents performing actions beyond intended autonomy limits or permissions.</td></tr><tr><td>19</td><td><strong>Excessive Data Exposure</strong></td><td>APIs or agents returning more data than required for an operation.</td></tr><tr><td>20</td><td><strong>Improper Inventory Management</strong></td><td>Undocumented, deprecated, or shadow agents, tools, or APIs.</td></tr><tr><td>21</td><td><strong>Improper Output Handling</strong></td><td>Unsafe formatting, rendering, or downstream consumption of agent or LLM outputs.</td></tr><tr><td>22</td><td><strong>Injection Attacks (Inject)</strong></td><td>SQL, NoSQL, expression, or generic injection vulnerabilities.</td></tr><tr><td>23</td><td><strong>Input Validation (INPUT)</strong></td><td>Missing validation of input type, format, length, or allowed values.</td></tr><tr><td>24</td><td><strong>Lack of Resources &#x26; Rate Limiting</strong></td><td>Absence of throttling controls enabling abuse or resource exhaustion.</td></tr><tr><td>25</td><td><strong>Local File Inclusion (LFI)</strong></td><td>Unauthorized access to local files through user- or agent-controlled paths.</td></tr><tr><td>26</td><td><strong>Mass Assignment (MA)</strong></td><td>Unsafe binding of user input to internal objects without field allowlisting.</td></tr><tr><td>27</td><td><strong>MCP – Data Leak</strong></td><td>Leakage of sensitive data through MCP context, tools, or resources.</td></tr><tr><td>28</td><td><strong>MCP – Indirect Prompt Injection</strong></td><td>Prompt injection introduced via MCP tools, resources, or external context.</td></tr><tr><td>29</td><td><strong>MCP – Malicious Code Execution</strong></td><td>Unsafe code execution through MCP tool definitions or invocation.</td></tr><tr><td>30</td><td><strong>MCP Security – Broken Authentication</strong></td><td>Authentication failures or identity validation gaps in MCP servers.</td></tr><tr><td>31</td><td><strong>MCP Security – Denial of Service</strong></td><td>Resource exhaustion or availability attacks targeting MCP servers.</td></tr><tr><td>32</td><td><strong>MCP Security – Input Validation</strong></td><td>Missing or weak validation of MCP inputs, parameters, or payloads.</td></tr><tr><td>33</td><td><strong>Misinformation</strong></td><td>Generation or propagation of misleading or deceptive information by agents.</td></tr><tr><td>34</td><td><strong>Misconfigured HTTP Headers</strong></td><td>Missing or insecure HTTP security headers.</td></tr><tr><td>35</td><td><strong>Model Context Protocol (MCP)</strong></td><td>Core MCP security including context isolation, tool exposure, and resource boundaries.</td></tr><tr><td>36</td><td><strong>Prompt Injections</strong></td><td>Direct prompt injection attacks against LLM or agent prompts.</td></tr><tr><td>37</td><td><strong>Security Misconfiguration</strong></td><td>Insecure defaults, exposed debug settings, or unsafe deployment configurations.</td></tr><tr><td>38</td><td><strong>Sensitive Information Disclosure</strong></td><td>Exposure of secrets, credentials, PII, internal prompts, or proprietary data.</td></tr><tr><td>39</td><td><strong>Server-Side Request Forgery (SSRF)</strong></td><td>Unauthorized internal or external network requests initiated by agents.</td></tr><tr><td>40</td><td><strong>Server-Side Template Injection (SSTI)</strong></td><td>Unsafe template rendering allowing code execution or data access.</td></tr><tr><td>41</td><td><strong>Server Version Disclosure</strong></td><td>Exposure of server, framework, or runtime version details.</td></tr><tr><td>42</td><td><strong>Supply Chain</strong></td><td>Risks from third-party models, tools, plugins, or external dependencies.</td></tr><tr><td>43</td><td><strong>System Prompt Leakage</strong></td><td>Exposure of system prompts, internal instructions, or agent configuration details.</td></tr><tr><td>44</td><td><strong>Unbounded Consumption</strong></td><td>Unrestricted token usage, tool execution, or resource consumption by agents.</td></tr><tr><td>45</td><td><strong>Unnecessary HTTP Methods</strong></td><td>Enabled HTTP verbs that increase attack surface.</td></tr><tr><td>46</td><td><strong>Vector and Embedding Weaknesses</strong></td><td>Weaknesses in embedding generation, vector storage, or retrieval logic.</td></tr><tr><td>47</td><td><strong>Verbose Error Messages</strong></td><td>Error responses exposing stack traces or internal logic.</td></tr></tbody></table>

## Expected Outcome

Using AI Red Teaming probe categories, you gain structured visibility into security risks across LLMs, and agents. Category-level organisation supports risk-based prioritisation, clearer reporting, and consistent governance for AI-enabled systems.

## What Next

To create customised probes as per your requirement: [Learn how to create custom probes](/akto-argus-agentic-ai-security-for-homegrown-ai/probe-library/how-to/create-a-custom-test.md)


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://ai-security-docs.akto.io/akto-argus-agentic-ai-security-for-homegrown-ai/probe-library/concepts/test-categories.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
