Skip to main content
redteams.ai
All tags

# checkpoint-manipulation

1 articletagged with “checkpoint-manipulation

Sequential Workflow Exploitation

Techniques for exploiting sequential agentic workflows by poisoning early stages to corrupt downstream processing, manipulating checkpoints, and exploiting inter-step data dependencies.

sequential-workflowscascading-corruptioncheckpoint-manipulationpipeline-poisoning
Advanced