Volume I · Edition 1.0
A Reference Framework for the AI Agent Era
May 2026 · LiveVigil AI Security
The Vigil Periodic Table™of AI Threats.
41
Elements catalogued
Ranked by impact · coded by coverage
Ranked by impact · coded by coverage
01 · n=8Critical
02 · n=16High
02.1MjMulti-turn jailbreak02.2IpIndirect injection02.3MtMCP tool poison02.4CaCross-agent collusion02.5SmSilent model swap02.6JmJudgement manip.02.7CpCyber-physical home02.8SaShadow AI02.9MkMarkdown exfil02.10IeIP exfiltration02.11CgCode gen leak02.12SqSlopsquatting02.13HdHelp-desk takeover02.14KbKYC bypass02.15EmEmail security02.16EiElection interference
03 · n=10Medium
Live today
5of 41
Shipped in production. The engine carries the coverage.
Coming soon
19of 41
Active build. Where the next twelve months sit.
Partner category
7of 41
Real problems. Owned better by specialist vendors.
Out of scope
10of 41
Belongs elsewhere by design. Provider, regulator, platform.
Edition notes
A reference framework, not marketing.
Forty-one ways AI can hurt you. The OWASP LLM Top 10 catalogued ten of these in 2023. The MITRE ATLAS matrix covers a different fourteen as of 2025. Vigil maps all forty-one in one framework: ranked by real-world impact, color-coded by what we defend today, what is in build, and what belongs elsewhere by design. Updated quarterly. Versioned publicly.
How to read this
Each cell carries a vector identifier (top), a two-letter code (centre), and the threat name (foot). Rows are tiers of impact, descending. Cell colour indicates Vigil’s current coverage state. The accent bar above each cell is a fast-scan signal of the same.
Cited frameworks
OWASPLLM Top 10 v2025
MITREATLAS v3
NISTAI RMF 1.0
CSAAI Threat Working Group
EUAI Act, Annex III
Forty-one vectors. One framework. Read the full reference, vector by vector, with what Vigil ships today and what is coming next.
Read the full referenceTier 01 · Critical8 vectors
01.1
Today
Memory Integrity Layer 1. Operation classifier. Quarantine engine. Vault diffing on every memory write.
Next
Cross-provider memory correlation across ChatGPT, Claude, Gemini. Already shipping in v2.1.0.
01.2
Today
Agency score. Scope tags. Tier 3 sync watchdog. Execution Gate. Three-layer kill switch.
Next
Cross-agent causality DAG. Capability decay. Reversibility-scored authorization.
01.3
Today
Not yet covered.
Next
vigil-deepfake module. On-device MLX inference for real-time call detection above 90 percent accuracy.
01.4
Today
Not yet covered.
Next
vigil-deepfake module. On-device voice authenticity scoring on incoming calls.
01.5
Today
Local-first architecture. Hash-chained VOAF. Cross-provider visibility no single provider can match.
Next
Provider trust ledger. Cryptographically signed public artifact tracking ToS, retention, and silent model swaps.
01.6
Today
Not directly covered.
Next
Sovereign household tier provides surface-level coverage. Hash matching belongs with Thorn and NCMEC. Conversational classifiers stay with specialists.
01.7
Today
Physical Bridge Layer 5 gates physical-world consequences from agent actions.
Next
Direct ICS coverage stays with Claroty, Dragos, MedCrypt. Vigil owns the AI-to-physical seam, not the device.
01.8
Today
Out of scope.
Next
Architecturally refused. Vigil does not classify intent content. The provider safety stack owns this layer.
Tier 02 · High16 vectors
02.1
Today
LSTM detects sequence drift across turns. Bayesian network correlates anomalies. Multi-Window CUSUM catches slow-build attacks.
Next
Behavioral fingerprint flags persona drift mid-session.
02.2
Today
Two-surface pipeline. Statistical models on the response side fire regardless of where the injection came from.
Next
Causality graph traces which input source produced which downstream agent action.
02.3
Today
Decompose surface for tool calls. Statistical anomaly detection on response payloads.
Next
TAP fingerprint per agent. Cloud Agent Registry coverage states.
02.4
Today
Single-agent monitoring across providers. Each agent observed independently.
Next
Cross-Agent Causality DAG. Built specifically for this attack class.
02.5
Today
Four-model behavioral baseline. Detects drift even without a public announcement.
Next
Behavioral fingerprint diff against the published model card.
02.6
Today
VOAF preserves the full response for retrospective review. Behavioral baseline catches sudden shifts in tone or argumentation.
Next
Persuasion pattern detection in responses. Framing bias scoring. Cross-provider response comparison on the same question.
02.7
Today
Physical Bridge Layer 5. Mandatory gate on real-world state changes. Pre-execution snapshot for rollback.
Next
Sovereign tier household coverage of four. Physical Bridge expansion to IoT MCP servers.
02.8
Today
Local proxy gives per-user visibility into outbound prompts.
Next
Developer plan DLP for outbound prompts. Cloud Agent Registry surfaces unmanaged AI use across the org.
02.9
Today
Proxy sees the call. Renderer fetch is downstream and not yet monitored.
Next
Outbound URL monitoring on AI surface fetches. Closes the canary loop end-to-end.
02.10
Today
Outbound prompt visibility at the proxy.
Next
Developer plan DLP plus canary tokens. Detects when seeded data appears outside authorized channels.
02.11
Today
Proxy intercepts Cursor and Copilot traffic.
Next
Outbound secret detection in coding-agent prompts. VOAF audit on every code call.
02.12
Today
Not yet covered.
Next
Pattern matching on generated install commands referencing non-existent or recently registered packages.
02.13
Today
User-side coverage via vigil-deepfake.
Next
The help-desk side belongs with enterprise IAM and call-center authentication vendors.
02.14
Today
Not covered.
Next
Onfido, Persona, iProov own this category. Vigil does not enter regulated identity.
02.15
Today
Not covered.
Next
Abnormal, Material, Tessian own this category.
02.16
Today
Out of scope.
Next
Platform responsibility. Anthropic, OpenAI, Meta, X own the integrity surface. Vigil does not.
Tier 03 · Medium10 vectors
03.1
Today
Two-surface pipeline. Statistical models on the response side. Scope violation detection.
Next
Behavioral fingerprint drift confirms the model is not following its baseline.
03.2
Today
Hash-chained VOAF. vigil-verify CLI as open source. Tamper-evident at every transcript boundary.
Next
Four independent hash chains in VOAF v2.0. Causality graph attributes events across agents.
03.3
Today
Not yet covered.
Next
Token-velocity anomaly inside Multi-Window CUSUM. Developer plan rate limiting.
03.4
Today
Not covered.
Next
Sycophancy and dependency scores as observational components in the Weekly Brief. Never advice.
03.5
Today
Not yet covered on the impersonation axis.
Next
Per-user behavioral fingerprint as anti-impersonation primitive. Research stage.
03.6
Today
Proxy sees the AI request that uses the RAG system.
Next
The Vigil cloud proxy intercepts enterprise RAG calls. Vector DB integrity stays with the vendor.
03.7
Today
VOAF gives the evidence layer for downstream investigation when harm occurs.
Next
Bias and accuracy classifiers belong with FairNow, Credo AI, and domain specialists.
03.8
Today
Out of scope.
Next
Specialist vendors and regulators own this. Not Vigil.
03.9
Today
Out of scope.
Next
Market integrity belongs with exchanges and regulators.
03.10
Today
Out of scope.
Next
Platform integrity problem. Not Vigil.
Tier 04 · Lower7 vectors
04.1
Today
Not covered. The proxy decodes JSON, not pixels.
Next
Image and audio surface decoding. Slotted into MIRROR P2 scope.
04.2
Today
Not covered.
Next
Add to vigil-watermark scope after MIRROR P1.
04.3
Today
Out of scope.
Next
Provider responsibility. Not Vigil.
04.4
Today
Out of scope.
Next
Pinecone, Weaviate, and incumbents own internal vector security.
04.5
Today
Out of scope.
Next
Architecturally refused. Detection is statistical. Never AI-based.
04.6
Today
Out of scope.
Next
Platforms own this category.
04.7
Today
Out of scope.
Next
Cloudflare, Akamai, and providers own this layer.