# agentic
39 articlestagged with “agentic”
Haystack Pipeline Exploitation
Exploiting Haystack's pipeline architecture for component injection and data flow manipulation.
Phidata Agent Attacks
Security analysis of Phidata agent framework including knowledge base poisoning and tool abuse.
Vector-Based Memory Poisoning
Poisoning vector-based memory stores in agent systems to inject false context into retrieval.
Structured Output Tool Injection
Exploiting structured output mode to inject tool call directives into model responses.
Tool Disambiguation Attacks
Exploiting tool selection ambiguity to redirect function calls to unintended tools.
Agentic Exploitation
Comprehensive coverage of security vulnerabilities in agentic AI systems, including MCP tool exploitation, multi-agent protocol attacks, function calling abuse, memory system compromise, framework-specific weaknesses, and workflow pattern attacks.
MCP Configuration Injection
Injecting malicious configuration into MCP server initialization for persistent compromise.
MCP Dynamic Tool Registration Attacks
Attacking dynamic tool registration in MCP to inject malicious tools at runtime.
MCP Root Listing Exploitation
Exploiting MCP root listing capabilities to discover and access sensitive file system resources.
MCP SSE Transport Security Analysis
Security analysis of Server-Sent Events transport in MCP including reconnection attacks and event injection.
MCP stdio Transport Exploitation
Exploiting the stdio transport mechanism in MCP for inter-process communication attacks and data interception.
A2A Artifact Manipulation
Manipulating artifacts exchanged between agents in A2A protocol for data poisoning and injection.
A2A Agent Discovery Exploitation
Exploiting the A2A agent discovery mechanism to register malicious agents or impersonate trusted ones.
A2A Push Notification Abuse
Abusing A2A push notification mechanisms for out-of-band data exfiltration and command injection.
A2A Task State Manipulation
Manipulating task states in A2A to skip validation, bypass approval, or redirect task completion.
Supervisor Agent Override
Techniques for overriding supervisor agents in hierarchical multi-agent architectures.
Tool Chain Amplification Attacks
Amplifying attack impact by chaining tool calls in agent workflows for cascading exploitation.
Workflow Checkpoint Manipulation
Manipulating workflow checkpoints and savepoints for state rollback attacks.
Advanced Practice Exam
25-question practice exam covering advanced AI red team techniques: multimodal attacks, training pipeline exploitation, agentic system attacks, embedding manipulation, and fine-tuning security.
Agentic AI Security Practice Exam 1
Practice exam focused on MCP exploitation, function calling attacks, and multi-agent security vulnerabilities.
Agentic AI Security Practice Exam 2
Advanced practice exam covering agent memory poisoning, workflow exploitation, and A2A protocol attacks.
Agentic Security Specialist Practice Exam
Specialized practice exam focusing on agent security, MCP, A2A, and multi-agent systems.
Agent Memory Security Assessment
Assessment covering memory poisoning, context manipulation, exfiltration, and cross-session persistence attacks.
Agentic Exploitation Assessment
Assessment covering MCP exploitation, function calling abuse, agent memory attacks, and A2A injection.
Agentic Exploitation Assessment (Assessment)
Test your knowledge of agentic AI attacks, MCP exploitation, function calling abuse, and multi-agent system vulnerabilities with 15 intermediate-level questions.
Function Calling Security Assessment
Assessment focused on JSON schema injection, parameter manipulation, recursive calling, and result poisoning attacks.
Advanced MCP Security Assessment
Comprehensive assessment of MCP protocol vulnerabilities including transport attacks, tool poisoning, and capability escalation.
Workflow Patterns Security Assessment
Assessment of sequential, parallel, and hierarchical agent workflow exploitation techniques.
Advanced Agentic Exploitation Assessment
Advanced assessment covering MCP exploitation chains, multi-agent attacks, and A2A protocol injection.
Skill Verification: Function Calling Attacks
Skill verification for schema injection, parameter manipulation, and result poisoning techniques.
Agentic Security Study Guide
Study guide for agentic security assessments covering MCP, A2A, function calling, and multi-agent attacks.
Capstone: Pentest an Agentic AI System End-to-End
Conduct a full penetration test of an agentic AI system with tool use, multi-step reasoning, and autonomous decision-making capabilities.
Capstone: Multi-Agent System Assessment (Capstone)
Assessing security of a complex multi-agent system with tool use, memory, and inter-agent communication covering the full agentic attack surface.
Capstone: Agentic System Red Team
Red team a multi-agent system with MCP servers, function calling, and inter-agent communication, producing an attack tree and comprehensive findings report.
Summer 2026 CTF: Agentic AI Security
An agentic AI security focused CTF with escalating agent challenges covering tool exploitation, multi-agent attacks, indirect injection, and agent persistence.
Agentic AI Alignment Challenges
Analysis of alignment challenges specific to tool-using, planning, and autonomous AI agents in production environments.
Simulation: Agentic Workflow Full Engagement
Expert-level red team simulation targeting a multi-tool AI agent with code execution, file access, and API integration capabilities.
AI-Specific Threat Modeling (Tradecraft)
Applying ATLAS, STRIDE, and attack tree methodologies to AI systems. Trust boundary analysis for agentic architectures, data flow analysis, and MCP threat modeling.
Agentic System Assessment Methodology
Comprehensive methodology for assessing agentic AI systems including tool use, memory, and multi-agent interactions.