AI Governance Glossary

125 terms every AI builder needs to know — from Zero Trust for AI to every competitor framework. The vocabulary of the post-guardrails era.

Threats

AI HallucinationView definition →Prompt InjectionView definition →TOCTOU AttackView definition →AI Drift DetectionView definition →AI Red TeamingView definition →AI Margin Collapse PointView definition →The AI Verification PenaltyView definition →AI Models as Depreciating AssetsView definition →ExecutionView definition →AI Response Drift (LLM Inconsistency)View definition →Agentic OrchestrationView definition →Shadow AIView definition →AgentOps (Agent Operations)View definition →Sovereign AIView definition →Human-on-the-LoopView definition →Agent Scratchpad (Memory State)View definition →The Governance-Containment GapView definition →Intent-Based PermissioningView definition →Agentic Kill-Switch ArchitectureView definition →Autonomy GatesView definition →Deterministic GuardrailsView definition →LangChain Agent Loop ExploitView definition →CrewAI Agent Privilege Escalation VulnerabilityView definition →Vector Poisoning Attacks: Adversarial Manipulation of Emb...View definition →LLM Jailbreak Production Impact: Exploiting AI for Unauth...View definition →Agent-State-Corruption: Deterministic Execution Flow Mani...View definition →LLM Prompt Injection Attacks: Adversarial Manipulation of...View definition →AI Agent Data Exfiltration: Covert Information Disclosure...View definition →Agentic Shadow IT: Unsanctioned AI Automation & Data Exfi...View definition →LLM Indirect Prompt Injection: Covert Data Exfiltration v...View definition →Cross-Site Scripting in LLMs: Prompt Injection for UI Man...View definition →Server-Side Request Forgery (SSRF) in LLMs: Prompt Inject...View definition →AI Model Denial-of-Service (AMDoS) AttackView definition →LLM Supply Chain Vulnerabilities: Exploiting Third-Party...View definition →RAG Data Poisoning: Retrieval-Augmented Generation Integr...View definition →AI Agent Authorization Bypass: Exploiting Imperfect Polic...View definition →LLM Insecure Output Handling: Post-Generation Execution V...View definition →AI Agent Access Control Flaws: Exploiting Insufficient Au...View definition →LLM Firewall: Mitigating Prompt Injection and Unauthorize...View definition →LLM API Security Best Practices: Mitigating Prompt Inject...View definition →AI Red Teaming for Agents: Probing LLM-Powered Autonomous...View definition →Zero-Day Vulnerabilities in LLMs: Unpatched Exploits in G...View definition →AI Agent Lateral Movement: Exploiting Tool Access and Exe...View definition →Copilot Data Leakage Risks: Inadvertent Code Exposure via...View definition →Autonomous Agent Kill Switch: Ensuring Deterministic Cont...View definition →LLM Credential Theft: Prompt Injection for Sensitive Data...View definition →AI Agent Infinite Loop Costs: Uncontrolled Resource Consu...View definition →Semantic Firewall: Contextual AI Execution ControlView definition →LLM Training Data Extraction: Adversarial Reconstruction...View definition →RAG Access Control Vulnerabilities: Data Exfiltration and...View definition →AI Agent Privilege Escalation: Exploiting Execution ContextsView definition →LLM System Prompt Leakage: Adversarial Evasion of GuardrailsView definition →Evaluating AI Agent Trust: Mitigating Undesired Autonomy...View definition →Deterministic vs. Probabilistic Security Paradigms in Exe...View definition →AI Agent Compliance Monitoring: Real-time Policy Enforcem...View definition →Securing LangChain Tool Calls: Mitigating Arbitrary Code...View definition →CrewAI Security Risks: Multi-Agent Orchestration Vulnerab...View definition →AutoGen Agent Vulnerabilities: Execution Flow Hijacking &...View definition →LLM Function Calling Exploits: Prompt Injection via Tool...View definition →AI Agent Identity Management: Securing Autonomous AI Syst...View definition →Securing MCP Model Context Protocol: Preventing Context I...View definition →AI CSPM (Cloud Security Posture Management for AI/ML Work...View definition →LLM Jailbreak Prompts: Adversarial Evasion of Safety Alig...View definition →AI Agent Session Hijacking: Persistent State Manipulation...View definition →Guardrails for AI Agents: Mitigating Autonomous Action RisksView definition →Cryptographic Execution for LLMs: Integrity & Confidentia...View definition →Securing Vector Databases: Mitigating Data Exfiltration a...View definition →AI Agent Audit Logs: Tracing Deterministic Execution Path...View definition →Zero-Trust Architecture for AI Systems: Securing Inferenc...View definition →LLM-as-a-Service Security: Mitigating Supply Chain and AP...View definition →AI Agent Rate Limiting: Safeguarding Against Resource Exh...View definition →Vulnerability Management for LLMs: Proactive Risk Mitigat...View definition →AI Agent Penetration Testing: Probing LLM Tool Use and Au...View definition →Securing Internal LLM Tools: Mitigating Prompt Injection...View definition →AI Agent Financial Fraud Risks: Exploiting Autonomous Dec...View definition →Defending Against Rogue AI Agents: Mitigating Autonomous...View definition →