survey 2025

A Survey on Agentic Security: Applications, Threats and Defenses

Asif Shahriar 1, Md Nafiu Rahman 1, Sadif Ahmed 1, Farig Yousuf Sadeque 1, Md Rizwan Parvez 2

8 citations · 161 references · arXiv

α

Published on arXiv

2510.06445

Prompt Injection

OWASP LLM Top 10 — LLM01

Excessive Agency

OWASP LLM Top 10 — LLM08

Insecure Plugin Design

OWASP LLM Top 10 — LLM07

Key Finding

Identifies prompt injection, excessive agency, and insecure tool use as the dominant unsolved threats in agentic systems, with critical gaps in non-GPT model coverage and benchmark standardization.


In this work we present the first holistic survey of the agentic security landscape, structuring the field around three fundamental pillars: Applications, Threats, and Defenses. We provide a comprehensive taxonomy of over 160 papers, explaining how agents are used in downstream cybersecurity applications, inherent threats to agentic systems, and countermeasures designed to protect them. A detailed cross-cutting analysis shows emerging trends in agent architecture while revealing critical research gaps in model and modality coverage. A complete and continuously updated list of all surveyed papers is publicly available at https://github.com/kagnlp/Awesome-Agentic-Security.


Key Contributions

  • First holistic three-pillar taxonomy of agentic security spanning Applications, Threats, and Defenses across 160+ papers
  • Detailed review of how LLM agents are deployed in offensive (red-team), defensive (blue-team), and domain-specific cybersecurity tasks — an area overlooked by prior surveys
  • Cross-cutting analysis identifying trends (monolithic-to-planner-executor migration, GPT backbone monopoly) and critical research gaps (modality coverage, benchmark fragmentation)

🛡️ Threat Analysis


Details

Domains
nlp
Model Types
llm
Threat Tags
inference_time
Applications
autonomous agentspenetration testingincident responsecybersecurity automation