Skip to main content

Documentation Index

Fetch the complete documentation index at: https://aarm.dev/llms.txt

Use this file to discover all available pages before exploring further.

Overview

Not every leak happens through the primary action output. Agents and their runtimes generate:
  • logs
  • traces
  • debug payloads
  • exception messages
  • telemetry fields
  • request metadata
These side channels can disclose sensitive information even when the main tool action appears safe.

Examples

ChannelLeak Example
Structured logsRaw email bodies or API tokens written to logs
TracesFull SQL queries containing PII stored in tracing spans
Error payloadsStack traces exposing secrets, file paths, or internal topology
MetadataSubject lines, object keys, or recipient addresses leaking intent

Why It Matters

  • side channels are often retained longer than primary outputs
  • they are frequently accessible to wider operator audiences
  • they are easy to miss during policy design because they are “supporting data”

AARM Mitigations

Redaction before export

Telemetry exporters should scrub or hash sensitive fields before they leave the AARM boundary.

Context-aware logging policy

Logging rules should account for the classification or sensitivity of the data involved in the action.

Receipt minimization

Receipts should preserve forensic value without copying high-risk payloads unnecessarily.
rules:
  - id: redact-sensitive-telemetry
    match:
      context.data_classification: [PII, CONFIDENTIAL]
      sink.type: telemetry
    action: MODIFY
    modifications:
      - redact: ["parameters.body", "result.raw_text", "trace.sql"]

Detection Signals

SignalIndicates
Sensitive parameters appear in logsMissing redaction
Trace payloads exceed expected metadata boundariesOver-collection
Error responses include secrets or internal topologyUnsafe exception handling
Different retention class than primary dataSecondary exposure risk

Key Takeaway

Securing the action alone is not enough. AARM must also constrain the surrounding observability surfaces so that context and payloads do not leak through the runtime’s own support systems.

Next

Telemetry

Export observability data without leaking sensitive context

Receipt Signing

Preserve forensic integrity without oversharing payloads