Preventing OWASP ASI10 Rogue Agents in a .NET AI agent with behavioural constraints, kill switches, audit logging, immutable tools, and defence in depth.
Preventing OWASP ASI09 Human-Agent Trust Exploitation in a .NET AI agent with medical disclaimers, tool-grounded responses, trust calibration, and confidence indicators.
Preventing OWASP ASI08 Cascading Failures in a .NET AI agent with resilience handlers, structured error responses, caching, and distributed tracing.
Preventing OWASP ASI07 Insecure Inter-Agent Communication in a .NET AI agent with mutual authentication, signed messages, anti-replay, typed contracts, and protocol pinning.
Preventing OWASP ASI06 Memory and Context Poisoning in a .NET AI agent with session isolation, content validation, cache TTLs, and immutable configuration.
Preventing OWASP ASI05 Unexpected Code Execution in a .NET AI agent with input validation, non-root containers, static tool registration, and runtime monitoring.
Preventing OWASP ASI04 Agentic Supply Chain Vulnerabilities in a .NET AI agent with SBOMs, dependency pinning, kill switches, and zero-trust architecture.
Preventing OWASP ASI03 Identity and Privilege Abuse in a .NET AI agent with Entra Agent ID, RBAC, federated credentials, and per-action authorization.
Implementing OWASP ASI02 mitigations against Tool Misuse and Exploitation in a .NET 10 AI agent built with the Microsoft Agent Framework.
My side project (Biotrackr) now has an agent! It's essentially a chat agent that interacts with my...
A practical walkthrough of the OWASP Agentic Top 10, implemented in a real .NET 10 AI agent built with the Microsoft Agent Framework.
Using the Microsoft Agent Framework, we can build agents that interact with our data via chat...
Introduction: The Identity Problem with AI Agents AI agents are moving beyond simple...
In Microsoft Entra Agent ID, we use agent identity blueprints to create agent identities and request...
As agents become more capable of making decisions, they require own identities to ensure proper...
Chat history and memory allow agents to maintain context across conversations and remember user...
Almost a year ago, I wrote a blog post on how you could use GitHub Models with Semantic Kernel...
I run various Container Apps as part of my personal health project. I want this project to be as low...
A couple of months ago, I wrote a blog post on how you can create Model Context Protocol (MCP)...
Determining how Azure AI Foundry Agents makes decisions is important for troubleshooting and...
I've lived in Melbourne for almost two years now, and throughout that time I've been trying to get my...
I'm making a conscious effort to deepen my knowledge on Semantic Kernel, and I just want an easy way...
In this article, I'm going to show you how to deploy an AKS Automatic Cluster within your own custom...
In this article, I'm going to show you how to build an Azure Kubernetes Service lab environment with...
In order to control traffic flow within our Azure virtual networks, we can use custom routes, and...
In distributed Azure architectures, it's necessary to split up your virtual network infrastructure...
To facilitate communication between resources in Azure deployed in virtual networks, we can use...
Azure Virtual Networks use private IP addresses which aren't routable on public networks. To enable...
Azure Virtual Networks (or VNETs) are the fundamental building block for private networks in Azure....
Sometime in the future, set-output commands in GitHub Actions will be depreciated! Here's how you can use Environment Files instead!