How Risk Map works
Risk Map combines data from multiple Cascade components to provide a complete risk picture.| Component | Contribution |
|---|---|
| Atlas | Provides structural graph of agents, tools, and permissions |
| DeepStream | Provides execution evidence from reasoning traces and tool calls |
| Sentinel | Contributes detections and enforcement outcomes |
What Risk Map represents
Risk nodes
Entities that can introduce, amplify, or receive risk in your system.| Node Type | Description |
|---|---|
| Agents | AI agents that make decisions and invoke tools |
| Tools | Functions and capabilities agents can execute |
| MCP servers | Model Context Protocol servers providing context |
| External APIs | Third-party services accessed by tools |
| Data sources | Databases, vector stores, and other data systems |
- Observed behaviors from DeepStream traces
- Permission scope and effective reach from Atlas
- Historical security signals from Sentinel
Risk signals
Signals are derived from runtime observations and detections.Security signals
Security signals
- Prompt injection attempts
- Policy-violating tool usage
- Privilege amplification paths
- Data access anomalies
Reliability signals
Reliability signals
- Alignment drift indicators
- Repeated failure or retry loops
- Unexpected behavior patterns
- Context degradation
How risk is computed
Risk Map does not rely on static scoring or predefined severity labels. Instead, risk emerges from the combination of multiple factors.1
Structural exposure
What an agent can do based on tools, permissions, and downstream connections.
2
Behavioral evidence
What the agent actually does at runtime based on DeepStream traces.
3
Detection outcomes
What Sentinel flags as anomalous, adversarial, or policy-violating.
4
Historical context
How behavior changes over time, including gradual alignment shifts or repeated near-misses.
Risk levels and interpretation
Risk Map surfaces relative risk, not absolute guarantees. Elevated-risk indicators include:- Behavioral anomalies: Agent accessing tools it historically never used
- Attack patterns: Repeated prompt injections that partially influence reasoning
- Data exposure: Data flowing to tools outside approved domains
- Permission drift: Effective permission graph expanding over time
Visual exploration
In the Cascade Dashboard, Risk Map allows teams to:- Visualize high-risk agents and tools
- Trace risk propagation paths end-to-end
- Correlate incidents with recent prompt, tool, or model changes
- Identify blast radius before enforcing stricter controls
Operational use cases
- Prioritization
- Access review
- Shadow detection
- Validation
Use Risk Map to identify which agents require stricter enforcement modes based on their risk profile and blast radius.
Relationship to enforcement
Risk Map is observational by default, it informs but does not automatically enforce security actions unless paired with Sentinel enforcement policies. Common workflow:- Use Risk Map to identify high-risk workflows
- Escalate those workflows to stricter enforcement modes
- Monitor whether risk decreases after changes
Programmatic access
Risk Map data is derived automatically once tracing is enabled.Python
- Associated agents and tools
- Execution context and trace evidence
- Propagation paths across the system