{"id":118425,"date":"2026-02-23T10:00:33","date_gmt":"2026-02-23T03:00:33","guid":{"rendered":"https:\/\/wp.eastgate-software.com\/?p=118425"},"modified":"2026-04-01T15:20:10","modified_gmt":"2026-04-01T08:20:10","slug":"agentic-ai-security-risks-exposed-in-mit-study-of-30-systems","status":"publish","type":"post","link":"https:\/\/wp.eastgate-software.com\/jp\/agentic-ai-security-risks-exposed-in-mit-study-of-30-systems\/","title":{"rendered":"Agentic AI Security Risks Exposed in MIT Study of 30 Systems"},"content":{"rendered":"<p><span data-contrast=\"auto\">Agentic AI is rapidly moving into enterprise mainstream adoption, but new research highlights serious security and governance gaps. A 2025 MIT-led study reviewing 30 of the most common agentic AI systems found widespread shortcomings in transparency, monitoring, and risk disclosure.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The report,\u00a0<\/span><i><span data-contrast=\"auto\">The\u00a02025 AI Index: Documenting Sociotechnical Features of Deployed Agentic AI Systems<\/span><\/i><span data-contrast=\"auto\">, examined public documentation, governance disclosures, and product materials. Researchers found that most agentic AI platforms\u00a0fail to\u00a0clearly\u00a0disclose\u00a0safety evaluations, third-party testing results, or usage monitoring mechanisms. Twelve of the thirty systems reviewed provide no meaningful usage monitoring, limiting enterprise visibility into resource consumption and agent activity.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Agentic AI differs from traditional chatbots by\u00a0operating\u00a0autonomously across workflows. These systems can access databases, execute multi-step tasks, and interact with enterprise platforms. However, the study reveals that many lack documented stop controls, runtime traceability, or clear AI identification mechanisms when interacting with external systems.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The researchers highlighted three examples.\u00a0OpenAI\u2019s ChatGPT Agent was positively distinguished for cryptographically signing browser requests, improving traceability.\u00a0By contrast, Perplexity\u2019s Comet browser\u00a0reportedly lacks\u00a0documented safety evaluation methodologies or third-party testing disclosures. HubSpot\u2019s Breeze agents\u00a0demonstrate\u00a0compliance certifications but offer limited transparency on security testing procedures.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The findings\u00a0indicate\u00a0that most agentic systems rely on closed-source frontier models such as OpenAI\u2019s GPT,\u00a0Anthropic\u2019s\u00a0Claude, and Google\u2019s Gemini. Yet developer transparency around operational safeguards\u00a0remains\u00a0inconsistent.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The study concludes that governance challenges will intensify as agentic capabilities expand. Enterprise leaders face increasing\u00a0risk\u00a0exposure if AI agents\u00a0operate\u00a0without adequate monitoring, accountability, or clear boundaries.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Researchers argue that responsibility lies with AI developers to improve disclosure standards, embed control mechanisms, and provide verifiable safety evaluations. Without stronger governance, agentic AI security risks may prompt regulatory intervention as adoption accelerates.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">\u30bd\u30fc\u30b9\uff1a\u00a0<\/span><\/b><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/www.zdnet.com\/article\/ai-agents-are-fast-loose-and-out-of-control-mit-study-find\/\"><span data-contrast=\"none\">https:\/\/www.zdnet.com\/article\/ai-agents-are-fast-loose-and-out-of-control-mit-study-find\/<\/span><\/a><span data-contrast=\"auto\">\u00a0<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>Agentic AI is rapidly moving into enterprise mainstream adoption, but new research highlights serious security and governance gaps. A 2025 MIT-led study reviewing 30 of the most common agentic AI systems found widespread shortcomings in transparency, monitoring, and risk disclosure.\u00a0 The report,\u00a0The\u00a02025 AI Index: Documenting Sociotechnical Features of Deployed Agentic AI Systems, examined public documentation, governance disclosures, and product materials. Researchers found that most agentic AI platforms\u00a0fail to\u00a0clearly\u00a0disclose\u00a0safety evaluations, third-party testing results, or usage monitoring mechanisms. Twelve of the thirty systems reviewed provide no meaningful usage monitoring, limiting enterprise visibility into resource consumption and agent activity.\u00a0 Agentic AI differs from traditional chatbots by\u00a0operating\u00a0autonomously across workflows. These systems can access databases, [&hellip;]<\/p>","protected":false},"author":238283293,"featured_media":118431,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_crdt_document":"","inline_featured_image":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1584],"tags":[1639,1488,1538],"class_list":["post-118425","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech-enthusiast","tag-agentic-ai","tag-ai","tag-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.4 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Agentic AI Security Risks Exposed in MIT Study of 30 Systems - Eastgate Software<\/title>\n<meta name=\"description\" content=\"A survey of 30 agentic AI systems reveals major gaps in transparency, monitoring, and safety controls, raising concerns.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"ja_JP\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Agentic AI Security Risks Exposed in MIT Study of 30 Systems\" \/>\n<meta property=\"og:description\" content=\"A survey of 30 agentic AI systems reveals major gaps in transparency, monitoring, and safety controls, raising concerns.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/wp.eastgate-software.com\/jp\/agentic-ai-security-risks-exposed-in-mit-study-of-30-systems\/\" \/>\n<meta property=\"og:site_name\" content=\"Eastgate Software\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/EastgateSoftware\/\" \/>\n<meta property=\"article:published_time\" content=\"2026-02-23T03:00:33+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-01T08:20:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/wp.eastgate-software.com\/wp-content\/uploads\/2026\/02\/EGS-news-website-1366-x-768px-16.webp?fit=1366%2C768&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"1366\" \/>\n\t<meta property=\"og:image:height\" content=\"768\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"huongnguyen253\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@EastgateSoft\" \/>\n<meta name=\"twitter:site\" content=\"@EastgateSoft\" \/>\n<meta name=\"twitter:label1\" content=\"\u57f7\u7b46\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"huongnguyen253\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"2\u5206\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/agentic-ai-security-risks-exposed-in-mit-study-of-30-systems\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/agentic-ai-security-risks-exposed-in-mit-study-of-30-systems\\\/\"},\"author\":{\"name\":\"huongnguyen253\",\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/#\\\/schema\\\/person\\\/01b8220b50bd555756a737527646a79a\"},\"headline\":\"Agentic AI Security Risks Exposed in MIT Study of 30 Systems\",\"datePublished\":\"2026-02-23T03:00:33+00:00\",\"dateModified\":\"2026-04-01T08:20:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/agentic-ai-security-risks-exposed-in-mit-study-of-30-systems\\\/\"},\"wordCount\":307,\"publisher\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/agentic-ai-security-risks-exposed-in-mit-study-of-30-systems\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/wp.eastgate-software.com\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/EGS-news-website-1366-x-768px-16.webp?fit=1366%2C768&ssl=1\",\"keywords\":[\"Agentic AI\",\"Ai\",\"cybersecurity\"],\"articleSection\":[\"Tech Enthusiast\"],\"inLanguage\":\"ja\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/agentic-ai-security-risks-exposed-in-mit-study-of-30-systems\\\/\",\"url\":\"https:\\\/\\\/wp.eastgate-software.com\\\/agentic-ai-security-risks-exposed-in-mit-study-of-30-systems\\\/\",\"name\":\"Agentic AI Security Risks Exposed in MIT Study of 30 Systems - Eastgate Software\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/agentic-ai-security-risks-exposed-in-mit-study-of-30-systems\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/agentic-ai-security-risks-exposed-in-mit-study-of-30-systems\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/wp.eastgate-software.com\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/EGS-news-website-1366-x-768px-16.webp?fit=1366%2C768&ssl=1\",\"datePublished\":\"2026-02-23T03:00:33+00:00\",\"dateModified\":\"2026-04-01T08:20:10+00:00\",\"description\":\"A survey of 30 agentic AI systems reveals major gaps in transparency, monitoring, and safety controls, raising concerns.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/agentic-ai-security-risks-exposed-in-mit-study-of-30-systems\\\/#breadcrumb\"},\"inLanguage\":\"ja\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/wp.eastgate-software.com\\\/agentic-ai-security-risks-exposed-in-mit-study-of-30-systems\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/agentic-ai-security-risks-exposed-in-mit-study-of-30-systems\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/wp.eastgate-software.com\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/EGS-news-website-1366-x-768px-16.webp?fit=1366%2C768&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/wp.eastgate-software.com\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/EGS-news-website-1366-x-768px-16.webp?fit=1366%2C768&ssl=1\",\"width\":1366,\"height\":768,\"caption\":\"Agentic AI Security Risks Exposed in MIT Study of 30 Systems\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/agentic-ai-security-risks-exposed-in-mit-study-of-30-systems\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/wp.eastgate-software.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Agentic AI Security Risks Exposed in MIT Study of 30 Systems\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/#website\",\"url\":\"https:\\\/\\\/wp.eastgate-software.com\\\/\",\"name\":\"Eastgate Software\",\"description\":\"A Global Fortune 500 Company&#039;s Strategic Partner\",\"publisher\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/wp.eastgate-software.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ja\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/#organization\",\"name\":\"Eastgate Software\",\"url\":\"https:\\\/\\\/wp.eastgate-software.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/wp.eastgate-software.com\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/logo.svg\",\"contentUrl\":\"https:\\\/\\\/wp.eastgate-software.com\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/logo.svg\",\"width\":124,\"height\":36,\"caption\":\"Eastgate Software\"},\"image\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/EastgateSoftware\\\/\",\"https:\\\/\\\/x.com\\\/EastgateSoft\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/#\\\/schema\\\/person\\\/01b8220b50bd555756a737527646a79a\",\"name\":\"huongnguyen253\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/21ed2e1167cb8fc59108a43023c298cbe9c81ec2b240fc3b6f8bbf05134975b1?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/21ed2e1167cb8fc59108a43023c298cbe9c81ec2b240fc3b6f8bbf05134975b1?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/21ed2e1167cb8fc59108a43023c298cbe9c81ec2b240fc3b6f8bbf05134975b1?s=96&d=identicon&r=g\",\"caption\":\"huongnguyen253\"},\"url\":\"https:\\\/\\\/wp.eastgate-software.com\\\/jp\\\/author\\\/huongnguyen253\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Agentic AI Security Risks Exposed in MIT Study of 30 Systems - Eastgate Software","description":"A survey of 30 agentic AI systems reveals major gaps in transparency, monitoring, and safety controls, raising concerns.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"ja_JP","og_type":"article","og_title":"Agentic AI Security Risks Exposed in MIT Study of 30 Systems","og_description":"A survey of 30 agentic AI systems reveals major gaps in transparency, monitoring, and safety controls, raising concerns.","og_url":"https:\/\/wp.eastgate-software.com\/jp\/agentic-ai-security-risks-exposed-in-mit-study-of-30-systems\/","og_site_name":"Eastgate Software","article_publisher":"https:\/\/www.facebook.com\/EastgateSoftware\/","article_published_time":"2026-02-23T03:00:33+00:00","article_modified_time":"2026-04-01T08:20:10+00:00","og_image":[{"width":1366,"height":768,"url":"https:\/\/i0.wp.com\/wp.eastgate-software.com\/wp-content\/uploads\/2026\/02\/EGS-news-website-1366-x-768px-16.webp?fit=1366%2C768&ssl=1","type":"image\/webp"}],"author":"huongnguyen253","twitter_card":"summary_large_image","twitter_creator":"@EastgateSoft","twitter_site":"@EastgateSoft","twitter_misc":{"\u57f7\u7b46\u8005":"huongnguyen253","\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593":"2\u5206"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/wp.eastgate-software.com\/agentic-ai-security-risks-exposed-in-mit-study-of-30-systems\/#article","isPartOf":{"@id":"https:\/\/wp.eastgate-software.com\/agentic-ai-security-risks-exposed-in-mit-study-of-30-systems\/"},"author":{"name":"huongnguyen253","@id":"https:\/\/wp.eastgate-software.com\/#\/schema\/person\/01b8220b50bd555756a737527646a79a"},"headline":"Agentic AI Security Risks Exposed in MIT Study of 30 Systems","datePublished":"2026-02-23T03:00:33+00:00","dateModified":"2026-04-01T08:20:10+00:00","mainEntityOfPage":{"@id":"https:\/\/wp.eastgate-software.com\/agentic-ai-security-risks-exposed-in-mit-study-of-30-systems\/"},"wordCount":307,"publisher":{"@id":"https:\/\/wp.eastgate-software.com\/#organization"},"image":{"@id":"https:\/\/wp.eastgate-software.com\/agentic-ai-security-risks-exposed-in-mit-study-of-30-systems\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/wp.eastgate-software.com\/wp-content\/uploads\/2026\/02\/EGS-news-website-1366-x-768px-16.webp?fit=1366%2C768&ssl=1","keywords":["Agentic AI","Ai","cybersecurity"],"articleSection":["Tech Enthusiast"],"inLanguage":"ja"},{"@type":"WebPage","@id":"https:\/\/wp.eastgate-software.com\/agentic-ai-security-risks-exposed-in-mit-study-of-30-systems\/","url":"https:\/\/wp.eastgate-software.com\/agentic-ai-security-risks-exposed-in-mit-study-of-30-systems\/","name":"Agentic AI Security Risks Exposed in MIT Study of 30 Systems - Eastgate Software","isPartOf":{"@id":"https:\/\/wp.eastgate-software.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/wp.eastgate-software.com\/agentic-ai-security-risks-exposed-in-mit-study-of-30-systems\/#primaryimage"},"image":{"@id":"https:\/\/wp.eastgate-software.com\/agentic-ai-security-risks-exposed-in-mit-study-of-30-systems\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/wp.eastgate-software.com\/wp-content\/uploads\/2026\/02\/EGS-news-website-1366-x-768px-16.webp?fit=1366%2C768&ssl=1","datePublished":"2026-02-23T03:00:33+00:00","dateModified":"2026-04-01T08:20:10+00:00","description":"A survey of 30 agentic AI systems reveals major gaps in transparency, monitoring, and safety controls, raising concerns.","breadcrumb":{"@id":"https:\/\/wp.eastgate-software.com\/agentic-ai-security-risks-exposed-in-mit-study-of-30-systems\/#breadcrumb"},"inLanguage":"ja","potentialAction":[{"@type":"ReadAction","target":["https:\/\/wp.eastgate-software.com\/agentic-ai-security-risks-exposed-in-mit-study-of-30-systems\/"]}]},{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/wp.eastgate-software.com\/agentic-ai-security-risks-exposed-in-mit-study-of-30-systems\/#primaryimage","url":"https:\/\/i0.wp.com\/wp.eastgate-software.com\/wp-content\/uploads\/2026\/02\/EGS-news-website-1366-x-768px-16.webp?fit=1366%2C768&ssl=1","contentUrl":"https:\/\/i0.wp.com\/wp.eastgate-software.com\/wp-content\/uploads\/2026\/02\/EGS-news-website-1366-x-768px-16.webp?fit=1366%2C768&ssl=1","width":1366,"height":768,"caption":"Agentic AI Security Risks Exposed in MIT Study of 30 Systems"},{"@type":"BreadcrumbList","@id":"https:\/\/wp.eastgate-software.com\/agentic-ai-security-risks-exposed-in-mit-study-of-30-systems\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/wp.eastgate-software.com\/"},{"@type":"ListItem","position":2,"name":"Agentic AI Security Risks Exposed in MIT Study of 30 Systems"}]},{"@type":"WebSite","@id":"https:\/\/wp.eastgate-software.com\/#website","url":"https:\/\/wp.eastgate-software.com\/","name":"Eastgate Software","description":"\u30b0\u30ed\u30fc\u30d0\u30eb\u30d5\u30a9\u30fc\u30c1\u30e5\u30f3500\u4f01\u696d\u306e\u6226\u7565\u7684\u30d1\u30fc\u30c8\u30ca\u30fc","publisher":{"@id":"https:\/\/wp.eastgate-software.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/wp.eastgate-software.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ja"},{"@type":"Organization","@id":"https:\/\/wp.eastgate-software.com\/#organization","name":"Eastgate Software","url":"https:\/\/wp.eastgate-software.com\/","logo":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/wp.eastgate-software.com\/#\/schema\/logo\/image\/","url":"https:\/\/wp.eastgate-software.com\/wp-content\/uploads\/2023\/09\/logo.svg","contentUrl":"https:\/\/wp.eastgate-software.com\/wp-content\/uploads\/2023\/09\/logo.svg","width":124,"height":36,"caption":"Eastgate Software"},"image":{"@id":"https:\/\/wp.eastgate-software.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/EastgateSoftware\/","https:\/\/x.com\/EastgateSoft"]},{"@type":"Person","@id":"https:\/\/wp.eastgate-software.com\/#\/schema\/person\/01b8220b50bd555756a737527646a79a","name":"\u30d5\u30aa\u30f3\u30b0\u30a8\u30f3253","image":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/secure.gravatar.com\/avatar\/21ed2e1167cb8fc59108a43023c298cbe9c81ec2b240fc3b6f8bbf05134975b1?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/21ed2e1167cb8fc59108a43023c298cbe9c81ec2b240fc3b6f8bbf05134975b1?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/21ed2e1167cb8fc59108a43023c298cbe9c81ec2b240fc3b6f8bbf05134975b1?s=96&d=identicon&r=g","caption":"huongnguyen253"},"url":"https:\/\/wp.eastgate-software.com\/jp\/author\/huongnguyen253\/"}]}},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/wp.eastgate-software.com\/wp-content\/uploads\/2026\/02\/EGS-news-website-1366-x-768px-16.webp?fit=1366%2C768&ssl=1","jetpack_shortlink":"https:\/\/wp.me\/pf8Ne8-uO5","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/wp.eastgate-software.com\/jp\/wp-json\/wp\/v2\/posts\/118425","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wp.eastgate-software.com\/jp\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wp.eastgate-software.com\/jp\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wp.eastgate-software.com\/jp\/wp-json\/wp\/v2\/users\/238283293"}],"replies":[{"embeddable":true,"href":"https:\/\/wp.eastgate-software.com\/jp\/wp-json\/wp\/v2\/comments?post=118425"}],"version-history":[{"count":4,"href":"https:\/\/wp.eastgate-software.com\/jp\/wp-json\/wp\/v2\/posts\/118425\/revisions"}],"predecessor-version":[{"id":119507,"href":"https:\/\/wp.eastgate-software.com\/jp\/wp-json\/wp\/v2\/posts\/118425\/revisions\/119507"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/wp.eastgate-software.com\/jp\/wp-json\/wp\/v2\/media\/118431"}],"wp:attachment":[{"href":"https:\/\/wp.eastgate-software.com\/jp\/wp-json\/wp\/v2\/media?parent=118425"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wp.eastgate-software.com\/jp\/wp-json\/wp\/v2\/categories?post=118425"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wp.eastgate-software.com\/jp\/wp-json\/wp\/v2\/tags?post=118425"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}