The Right Security Model for LLM Systems Richard McDaniel March 12, 2026
Most systems that use LLMs to process external input make the same mistake: they give the model access to secrets, expose it to attacker-controlled content, and then instruct it not to reveal anything.
That is a policy defense against a capability problem.
The threat is not that the model is malicious. The threat is that a sufficiently clever prompt can make an otherwise honest model behave as though it were. If a component can read secrets and also produce external output, then an adversary who controls its input has a path to exfiltration. The model does not need bad intent. It only needs enough reasoning ability to follow the wrong thread.