Detecting Rogue AI Agents: Tool Misuse and API Abuse at Runtime
When your CNAPP flags a suspicious dependency in an AI agent container, your WAF logs...
Nov 20, 2025
If you are dealing with securing cloud infrastructure, containers and applications, you probably have several security tools in place including cloud posture (CSPM/CNAPP), container security and runtime security. Tool coverage might look good on paper, but how can you know they work against real attacks?
ARMO CTRL (Cloud Threat Readiness Lab) helps you test your cloud security tools by deploying a safe, controlled attack lab that mimics real attack behaviors end‑to‑end. Unlike other attack simulations, CTRL starts with a web exploit before pivoting deeper into your cloud environment to simulate what real attacks look like.
ARMO CTRL runs curated attack scenarios against deliberately vulnerable sample services that model realistic flaws (e.g., command injection, LFI, SSRF, SQLi) that we expect to see attackers targeting. The goal is not to “find a bug,” but to validate whether your cloud and container controls detect, alert, and prevent as designed.
With ARMO CTRL, security and platform teams can:
Scenarios are narrowly scoped to produce meaningful artifacts—logs, process starts, network egress, query anomalies—without destructive side effects. Everything runs in a lab you control, so you can tune policies, test rule updates, and compare outcomes consistently.
Each attack lives in its own directory with a focused attack.sh. You deploy the lab and run the scripts against the included services. The payloads are designed to be realistic yet contained, producing artifacts your tools should detect (logs, process starts, network calls, query anomalies).
Example invocation:
cd command-injection export TARGET_URL=http://localhost:8081 ./attack.sh
You can also enable additional variants via environment flags (see the repository README.md).
The command injection scenario targets apps that forward user input to shell commands without proper validation.
What the script does:
How to run it against the sample lab:
# After deploying the Kubernetes lab (see Installation Guide), port-forward the Ping App: kubectl port-forward -n attack-suite service/ping-app 8081:80 & # Run the attack cd command-injection TARGET_URL=http://localhost:8081 ./attack.sh
What to monitor while it runs:
Expected outcome signals:
Run the suite in a lab that simulates a cloud environment:
See the repository README.md and INSTALLATION.md for step-by-step instructions.
This project is for authorized, educational, and testing use only. Always run in isolated environments you control, with explicit permission. The suite aims to produce realistic telemetry without causing destructive side effects, but you are responsible for where and how you run it. It is not intended to test your own application code; its purpose is to validate detection and protection mechanisms in cloud environments using deliberately vulnerable applications.
Effective security isn’t just about having tools—it’s about proving they work. Use CTRL to continuously validate your defenses, tighten your detections, and train your teams with confidence.
When your CNAPP flags a suspicious dependency in an AI agent container, your WAF logs...
Your behavioral anomaly detection tool just flagged 47 alerts from this morning’s AI agent deployment—but...
You’ve enabled GuardDuty EKS Runtime Monitoring across your clusters. You’ve configured IRSA for your Bedrock-calling...