When your agent's inbox gets compromised, existing IR playbooks don't apply. Here's a five-stage response process built for autonomous agents.