Skip to main content
redteams.ai
All tags

# agent-spoofing

1 articletagged with “agent-spoofing

Trust Boundary Attacks

Methodology for exploiting trust relationships between agents in multi-agent systems, including rogue agent registration, capability spoofing, transitive trust chain exploitation, and lateral movement techniques.

trust-boundariesmulti-agentlateral-movementdelegationagent-spoofingtransitive-trust
Expert