References
[1] “Cybersecurity & Data Privacy Risk Management Model (C).” https://securecontrolsframework.com/free/risk-management-model/.
[2] “Cybersecurity & Data Privacy Risk Management Model (CP-RMM) Overview.” https://securecontrolsframework.com/content/SCF-Risk-Management-Model.pdf, 2025.
[3] “MITRE ATT&CK.” https://attack.mitre.org/.
[4] “CWE - Common Weakness Enumeration.” https://cwe.mitre.org/.
[5] “CAPEC - Common Attack Pattern Enumeration and Classification (CAPEC™).” https://capec.mitre.org/index.html.
[6] “MITRE ATLAS™.” https://atlas.mitre.org/.
[7] “ATLAS Matrix MITRE ATLAS™.” https://atlas.mitre.org/matrices/ATLAS.
[8] “OWASP Top Ten Web Application Security Risks OWASP Foundation.” https://owasp.org/www-project-top-ten/.
[9] “OWASP Top 10 for Large Language Model Applications OWASP Foundation.” https://owasp.org/www-project-top-10-for-large-language-model-applications/.
[10] “OWASP Top 10 for Agentic Applications for 2026,” OWASP Gen AI Security Project. https://genai.owasp.org/resource/owasp-top-10-for-agentic-applications-for-2026/.
[11] A. Vassilev, A. Oprea, A. Fordyce, and H. Anderson, “Adversarial Machine Learning: A Taxonomy and Terminology of Attacks and Mitigations,” National Institute of Standards and Technology, NIST Artificial Intelligence (AI) 100-2 E2023, Jan. 2024. doi: 10.6028/NIST.AI.100-2e2023.
[12] “CWE - CWE-502: Deserialization of Untrusted Data (4.19).” https://cwe.mitre.org/data/definitions/502.html.
[13] P. Yarden, “All I Want for Christmas is Your Secrets: LangGrinch hits LangChain Core (CVE-2025-68664),” Cyata The Control Plane for Agentic Identity. https://cyata.ai/blog/langgrinch-langchain-core-cve-2025-68664/, Dec. 2025.
[14] G. Baran, “Critical Langchain Vulnerability Let attackers Exfiltrate Sensitive Secrets from AI systems,” Cyber Security News. https://cybersecuritynews.com/langchain-vulnerability/, Dec. 2025.
[15] R. Lakshmanan, “Critical LangChain Core Vulnerability Exposes Secrets via Serialization Injection,” The Hacker News. https://thehackernews.com/2025/12/critical-langchain-core-vulnerability.html.
[16] E. Hastings, “LangGrinch Vulnerability Exposes LangChain AI to Secret Theft Risks,” WebProNews. https://www.webpronews.com/langgrinch-vulnerability-exposes-langchain-ai-to-secret-theft-risks/, Dec. 2025.
[17] “CVE-2025-68664 - GitHub Advisory Database,” GitHub. https://github.com/advisories/GHSA-c67j-w6g6-q2cm.
[18] “CVE-2025-68665 - GitHub Advisory Database,” GitHub. https://github.com/advisories/GHSA-r399-636x-v7f6.
[19] “NVD - CVE-2025-68664.” https://nvd.nist.gov/vuln/detail/CVE-2025-68664.
[20] “NVD - CVE-2025-68665.” https://nvd.nist.gov/vuln/detail/CVE-2025-68665.
[21] A. Vassilev, A. Oprea, A. Fordyce, H. Anderson, X. Davies, and M. Hamin, “Adversarial Machine Learning: A Taxonomy and Terminology of Attacks and Mitigations,” National Institute of Standards and Technology, NIST Artificial Intelligence (AI) 100-2 E2025, Mar. 2025. doi: 10.6028/NIST.AI.100-2e2025.