defense 2026

Introducing the Generative Application Firewall (GAF)

Joan Vendrell Farreny , Martí Jordà Roca , Miquel Cornudella Gaya , Rodrigo Fernández Baón , Víctor García Martínez , Eduard Camacho Sucarrats , Alessandro Pignati

0 citations · 14 references · arXiv

α

Published on arXiv

2601.15824

Prompt Injection

OWASP LLM Top 10 — LLM01

Insecure Plugin Design

OWASP LLM Top 10 — LLM07

Key Finding

Proposes GAF as an architectural abstraction that unifies prompt injection defense, jailbreak detection, data masking, and agent tool security into a single enforcement layer, filling gaps unaddressable by traditional WAFs.

Generative Application Firewall (GAF)

Novel technique introduced


This paper introduces the Generative Application Firewall (GAF), a new architectural layer for securing LLM applications. Existing defenses -- prompt filters, guardrails, and data-masking -- remain fragmented; GAF unifies them into a single enforcement point, much like a WAF coordinates defenses for web traffic, while also covering autonomous agents and their tool interactions.


Key Contributions

  • Introduces the Generative Application Firewall (GAF) as a unified, centralized enforcement architecture for LLM application security, analogous to how WAFs coordinate defenses for web traffic.
  • Defines a layered threat model for conversational LLM systems covering semantic-level filtering, context/session-aware policy enforcement, and mediation of autonomous agent tool calls.
  • Identifies the gap between fragmented existing defenses (prompt filters, guardrails, data masking) and argues for a single enforcement point spanning users, sessions, agents, and tools.

🛡️ Threat Analysis


Details

Domains
nlp
Model Types
llm
Threat Tags
inference_timeblack_box
Applications
llm applicationsconversational aiautonomous ai agents