# chain
12 articlestagged with “chain”
Tool Chain Amplification Attacks
Amplifying attack impact by chaining tool calls in agent workflows for cascading exploitation.
AI Supply Chain Assessment
Assessment covering model provenance, dependency security, artifact integrity, and deployment verification.
Capstone: ML Supply Chain Audit
Capstone exercise: conduct a complete ML supply chain security audit for an organization.
Exploit Chain Builder
Building tools that automatically discover and chain multiple vulnerabilities into complete exploitation paths for complex LLM systems.
Chain-of-Thought Faithfulness Attacks
Exploiting unfaithful chain-of-thought reasoning where models' stated reasoning does not match their actual decision process.
Supply Chain Management AI Security
AI security in supply chain management including demand forecasting, supplier evaluation, and logistics optimization.
Multimodal Attack Chain Lab
Chain attacks across text, image, and structured data modalities to exploit multimodal system vulnerabilities.
CTF: Boss Rush
Chain attacks across multiple AI models in sequence. Each model guards the next, requiring different attack techniques at each stage. Defeat all five models to extract the final flag in this ultimate red teaming challenge.
Reasoning Chain Hijacking
Hijack the model's chain-of-thought reasoning to redirect its conclusions toward attacker-controlled objectives.
Encoding Chain Bypass Walkthrough
Walkthrough of chaining Base64, URL encoding, and Unicode tricks to bypass multi-layer input filters.
Model Supply Chain Poisoning
Walkthrough of poisoning ML supply chains through dependency confusion, model weight manipulation, and hub attacks.
Full Engagement: ML Supply Chain Audit
End-to-end engagement walkthrough for auditing an organization's ML model supply chain security.