# agent-card
2 articlestagged with “agent-card”
A2A Protocol Exploitation
Deep technical analysis of attack vectors targeting the Google Agent-to-Agent (A2A) protocol, covering JSON-RPC message injection, task state hijacking, agent card manipulation, discovery poisoning, streaming exploitation, and push notification abuse.
a2ajson-rpcprotocol-exploitationtask-hijackingsseagent-carddiscovery-service
A2A Agent Card Spoofing
Spoof A2A agent cards to advertise malicious capabilities and intercept task delegations from legitimate agents.
agentic-exploitationa2aagent-cardspoofing