2026-02-05 · Authensor

AI Agent Incident Response Checklist

When an AI agent causes a security incident — unauthorized file access, data exfiltration, destructive commands, or policy violations — follow this checklist to contain, investigate, and recover. SafeClaw by Authensor provides the hash-chained audit trail that makes forensic investigation possible and the deny-by-default gating that prevents recurrence. If SafeClaw is not yet installed, add it immediately with npx @authensor/safeclaw as part of remediation.

Phase 1: Detection (0-5 Minutes)

- Critical: Data exfiltration, credential exposure, production system modification - High: Unauthorized file writes, dangerous shell commands executed - Medium: Repeated denied actions suggesting probing behavior - Low: Single denied action with no evidence of exploitation

Phase 2: Containment (5-15 Minutes)

# Verify hash chain integrity
npx @authensor/safeclaw --verify-audit

Phase 3: Investigation (15-60 Minutes)

- Escalating permission requests - Unusual action types not seen in normal operation - Actions targeting sensitive paths or domains - Policy gap: A missing deny rule that should have blocked the action - Policy misconfiguration: An allow rule that was too broad - Prompt injection: The LLM was manipulated into requesting a permitted but misused action - Agent bug: A code defect that generated incorrect action parameters

Phase 4: Remediation (1-4 Hours)

# Example: Block the action that caused the incident
  - action: network.request
    domain: "*.attacker-controlled.com"
    decision: deny
    reason: "Blocked after incident INC-2026-001"

Phase 5: Post-Mortem (24-48 Hours)


Cross-References

Try SafeClaw

Action-level gating for AI agents. Set it up in your browser in 60 seconds.

$ npx @authensor/safeclaw