Technology Record - Issue 40: Spring 2026

across areas like model theft, data poisoning, data leaks, prompt injection attacks, model vulnerabilities, tools misuse and potentially over-permissioned agents.” Unlike traditional applications, agents remain dynamic: they reason, act autonomously and interact with multiple systems, characteristics that can be a threat when in the wrong hands. “Bad actors might exploit agents’ access and privileges, turning them into unintended double agents,” explains Jakkal. “Like human employees, an agent with too much access – or the wrong instructions – can become a vulnerability. When leaders lack observability in their AI ecosystem, risk accumulates silently.” 39

RkJQdWJsaXNoZXIy NzQ1NTk=