Module 1, Input-side defense
Build control logic for the earliest point in the attack chain.
How attacks vary across direct instructions, retrieved context, and tool outputs.
Where statistical and rule-based controls help most.
Configure layered defenses for a sample agent workflow.