# computer-use
6 articlestagged with “computer-use”
Computer Use Agent Attacks
Comprehensive analysis of attack vectors targeting AI systems with computer use capabilities, including GUI manipulation, pixel-level injection, and desktop environment exploitation techniques.
Computer Use & GUI Agent Attacks
Security risks of AI agents that interact with graphical interfaces: attack surfaces in browser automation, desktop control, and screen-based reasoning systems.
Screen Capture Injection
Techniques for injecting malicious content through screen capture pipelines used by computer use AI agents, including frame manipulation, capture timing attacks, and pixel-level payload delivery through the visual channel.
Frontier Research
Cutting-edge AI security research covering reasoning model attacks, code generation security, computer use agents, AI-powered red teaming, robotics and embodied AI, and alignment faking.
Lab: Computer Use Agent Exploitation
Hands-on lab exploring attack vectors against GUI-based computer use agents that interact with screens through vision and action primitives.
Attacks via Screen Capture and Computer-Use AI
Techniques for attacking AI systems that process screen captures, including computer-use agents, screen-reading assistants, and automated UI testing systems.