AI Security
Tool-Call Hijacking: Griffin AI vs Mythos
A hijacked tool call is more consequential than a hijacked response. The defence requires the tool layer to police the model, not the other way around.
Mar 24, 20263 min read
Deep dives, practical guides, and incident analyses from engineers who build Safeguard. No fluff, no vendor FUD — just what you need to ship secure software.
Weekly insights on software supply chain security, delivered to your inbox.