# delegation
6 articlestagged with “delegation”
CrewAI & AutoGen Security
Security analysis of multi-agent frameworks CrewAI and AutoGen, covering role manipulation, inter-agent injection, delegation abuse, and multi-agent coordination attacks.
A2A Delegation Chain Exploitation
Exploiting task delegation chains in multi-agent systems to achieve privilege escalation and unauthorized actions.
Trust Boundary Attacks
Methodology for exploiting trust relationships between agents in multi-agent systems, including rogue agent registration, capability spoofing, transitive trust chain exploitation, and lateral movement techniques.
A2A Task Delegation Hijacking
Hijack A2A task delegation chains to redirect sensitive operations to attacker-controlled agent endpoints.
Hierarchical Agent Attacks
Techniques for exploiting hierarchical agent systems where manager agents delegate to worker agents, including delegation manipulation, supervisor evasion, worker exploitation, and authority chain attacks.
CrewAI Agent Application Security Testing
End-to-end walkthrough for security testing CrewAI agent applications: crew enumeration, agent role exploitation, task injection, tool security assessment, delegation chain manipulation, and output validation.