Implications of inadequate logging exploitation by malicious artificial intelligence agents
Published 2025-05-16
Keywords
- Application logging,
- Cybersecurity vulnerabilities,
- Malicious AI agents,
- Anomaly detection,
- Logging infrastructure
How to Cite
Copyright (c) 2025 Tomislav Gligora, Igor Znika

This work is licensed under a Creative Commons Attribution 4.0 International License.
Abstract
Robust application logging is a critical component for securing systems. However poor logging practices, such as inconsistent event tracking and fragmented data, can introduce significant vulnerabilities within cybersecurity frameworks. Malicious Artificial Intelligence agents exploit gaps in system observability created by these deficiencies, hindering effective detection and response to threats. This paper explores the implications of inadequate logging infrastructure on system accountability and its potential for exploitation by Artificial Intelligence driven threats. By incorporating research from the domains of cybersecurity, artificial intelligence, anomaly detection, and digital forensics, it emphasizes the risks posed by inadequate logging in environments increasingly reliant on autonomous systems. Furthermore, this paper proposes strategies to enhance logging infrastructure to mitigate these risks, including real time anomaly detection, semantic log structuring, and improved auditability.
References
- AI: Advent of Agents Opens New Possibilities for Attackers (2025.) Accessed: March 13, 2025: https://www.security.com/threat-intelligence/ai-agent-attacks
- Cybercriminals Are Targeting AI Agents and Conversational Platforms: Emerging Risks for Businesses and Consumers (20024) Accessed: October 9, 2024: https://www.resecurity.com/blog/article/cybercriminals-are-targeting-ai-agents-and-conversational-platforms-emerging-risks-for-businesses-and-consumers