TAIBOM security review
This page provides the reports from the TAIBOM Testing and Evaluation work deliverable at the end of March 2025. These reports are provided for transparency purposes. It is important to note that the system full-stack security testing against the test implementation was performed in order to aid future developments. The vulnerabilities identified should not be read as fundamental insecurity in this TAIBOM implementation as it is essentially a prototype for exploration of the art of the possible as part of the research work.
The reports cover independent penetration testing of the TAIBOM code base (doc D5.6A), plus various security scenario (adversarial) testing against the AI models Copper Horse created with and without TAIBOMs applied (doc 5.6B). There are high-level industry recommendations which will be explored further in the future (doc D5.7).
D5.6 TAIBOM Evaluation Report Overview — Download PDF
D5.6A TAIBOM Security Testing Report and Remediation Plan — Download PDF
D5.6B TAIBOM Threats and Attacks Security Scenario Testing Against Selected Use Cases — Download PDF
D5.6C TAIBOM Functional Testing — Download PDF
D5.7 TAIBOM Industry Recommendations — Download PDF