Accelerated Innovation

Ship High-Performing GenAI Solutions, Faster...

A Deep Dive into Preventing Insecure GenAI Solution Plugins

Workshop
Are plugins extending your GenAI solutions faster than you can secure them?

Plugin-based extensions introduce new execution paths, dependencies, and data flows that can bypass core controls if not explicitly governed. 
To win, your GenAI solutions must control plugin risk through rigorous review, isolation, auditing, and lifecycle management.

The Challenge

As plugins proliferate, security gaps emerge outside core GenAI logic. 
• Hidden plugin vulnerabilities: Teams lack a systematic way to enumerate and assess plugin-based risks. 
• Weak installation controls: Plugin installation and configuration are inconsistently reviewed or enforced. 
• Insufficient isolation and auditing: Plugin execution, requests, and outputs are not adequately sandboxed or monitored. 
These gaps enable privilege escalation, data leakage, and uncontrolled expansion of the attack surface. 

Our Solution

In this hands-on workshop, your team designs and evaluates secure plugin controls for GenAI solutions through guided analysis and applied exercises. 
• Enumerate common plugin-based vulnerabilities specific to GenAI solution architectures. 
• Review plugin installation and configuration controls to reduce exposure. 
• Design sandboxing and isolation strategies for plugin execution environments. 
• Audit plugin requests and outputs to detect misuse or policy violations. 
• Define lifecycle and dependency management practices for plugins at scale. 

Area of Focus

Enumerating Plugin-Based Vulnerabilities 
Reviewing Plugin Installation and Config Controls 
Sandboxing and Isolating Plugin Execution 
Auditing Plugin Requests and Outputs 
Managing Plugin Lifecycles and Dependencies • Identify and categorize security risks introduced by GenAI plugins. 
• Apply consistent controls for plugin installation and configuration. 
• Isolate plugin execution to limit blast radius and privilege escalation. 
• Audit plugin behavior through structured request and output review. 
• Leave with a governance approach for managing plugin lifecycles and dependencies. 

Participants Will

• Identify and categorize security risks introduced by GenAI plugins. 
• Apply consistent controls for plugin installation and configuration. 
• Isolate plugin execution to limit blast radius and privilege escalation. 
• Audit plugin behavior through structured request and output review. 
• Leave with a governance approach for managing plugin lifecycles and dependencies. 

Who Should Attend:

Security EngineerSolution ArchitectsPlatform EngineersGenAI EngineersEngineering Managers

Solution Essentials

Format

Virtual or in-person 

Duration

4 hours 

Skill Level

Intermediate 

Tools

Plugin architecture diagrams, sandboxing patterns, and guided audit exercises 

Build Responsible AI into Your Core Ways of Working