# agent-memory
22 articlestagged with “agent-memory”
Context Window Attacks
Techniques for exploiting LLM context window limits, including strategic context overflow to push out system instructions, attention manipulation, and context budget exhaustion attacks.
Conversational Memory Poisoning
Poisoning conversation history stores to alter the agent's understanding of prior interactions.
Cross-Session Attack Persistence
Achieving attack persistence across separate agent sessions through memory manipulation.
Agent Memory Systems Security
Comprehensive overview of AI agent memory architectures and their security implications, covering conversation persistence, long-term memory stores, context window management, and attack surfaces.
Memory Compaction Exploitation
Exploiting memory summarization and compaction processes to persist adversarial instructions across compression cycles.
Memory Context Window Attacks
Exploiting memory systems that manage context window limitations to inject or suppress information.
Memory Deletion Prevention Attacks
Techniques for making adversarial memories resistant to cleanup, deletion, and purging operations.
Memory Exfiltration
Techniques for extracting data from AI agent memory systems, including extracting previous conversations, revealing other users' data, and cross-session information leakage.
Memory Isolation Bypass Techniques
Bypassing user-level and session-level memory isolation to access memories from other users or sessions.
Memory Priority and Relevance Manipulation
Manipulating memory retrieval ranking and priority scores to surface adversarial memories over legitimate ones.
Memory Retrieval Poisoning
Manipulating memory retrieval mechanisms to surface adversarial context during agent reasoning.
Memory Schema Injection
Injecting structured data into memory systems that alters agent behavior when retrieved in future interactions.
Memory Summary Manipulation
Exploiting automatic memory summarization to embed persistent instructions in compressed context.
Persistent Memory Injection
Injecting persistent false memories into agent memory systems to influence future behavior.
Memory Compression Injection
Inject persistent instructions through memory compression and summarization processes in long-running agents.
Memory Eviction Exploitation
Exploit memory eviction policies in context-limited agents to selectively remove safety-relevant context.
RAG-Memory Confusion Attacks
Exploit the interaction between RAG retrieval and agent memory to create conflicting contexts that bypass safety.
Shared Memory Space Poisoning
Poison memory spaces shared between multiple agents or users in multi-tenant agent deployments.
Agent Memory Security Assessment
Assessment covering memory poisoning, context manipulation, exfiltration, and cross-session persistence attacks.
Skill Verification: Agent Memory Attacks
Practical verification of memory poisoning, context manipulation, and cross-session persistence skills.
Agent Memory Injection for Persistent Access
Inject persistent instructions into agent memory systems that survive across conversation sessions.
Memory Poisoning Step by Step
Walkthrough of persisting injection payloads in agent memory systems to achieve long-term compromise of LLM-based agents.