# cascading-failures
2 articlestagged with “cascading-failures”
Multi-Agent & A2A Protocol Exploitation
Exploitation techniques for multi-agent systems and the Google Agent-to-Agent (A2A) protocol, covering trust model attacks, message injection, orchestrator compromise, and cascading failure exploitation.
multi-agenta2aprotocol-exploitationorchestratortrust-modelscascading-failures
Data Corruption
How compromised LLM outputs corrupt downstream systems through database pollution, cascading pipeline failures, RAG feedback loops, and automated decision poisoning.
data-corruptiondownstream-poisoningcascading-failuresrag-feedbackimpact