Prompt injection (LLM), SQL injection (Web), and goal hijacking (Agentic) are all the same flaw: untrusted input alters instructions. Each has its own solution and it only needs to be addressed once.
Pick a vulnerability on the left to see (1) core flaws and (2) where they touch the architecture. Or click an architecture node to see which core flaws tend to land there.
Understand how your architecture influences security findings
The key insight: Every vulnerability maps to specific architectural components. By understanding these connections, you can see exactly where in your system each security risk originates — and where to focus your defenses.
This diagram is intentionally generic (Cloudflare/WAF/K8s/etc.). If you want, we can swap in your real components and adjust the mappings.
These 10 canonical flaws underlie all vulnerability categories. Click any flaw for details.
Tour description here