# agent-exploitation
4 articlestagged with “agent-exploitation”
Agentic Workflow Pattern Attacks
Overview of attacks targeting common agentic workflow patterns including sequential, parallel, and hierarchical execution, covering how workflow structure creates unique exploitation opportunities.
workflow-patternssequentialparallelhierarchicalagent-exploitation
Parallel Execution Attacks
Techniques for exploiting parallel execution in agentic systems, including race conditions, conflicting tool calls, output aggregation manipulation, and resource contention attacks.
parallel-executionrace-conditionsaggregationconcurrencyagent-exploitation
Agent Exploitation Assessment
Test your understanding of AI agent security, tool-use attacks, confused deputy scenarios, and agentic system exploitation with 10 intermediate-level questions.
assessmentagent-exploitationtool-useconfused-deputyagentic-ai
Skill Verification: Agent Exploitation (Assessment)
Timed skill verification lab: exploit an agent system to perform unauthorized actions within 25 minutes.
skill-verificationagent-exploitationtool-abusehands-on