# discovery
7 articlestagged with “discovery”
A2A Agent Discovery Exploitation
Exploiting the A2A agent discovery mechanism to register malicious agents or impersonate trusted ones.
Automated Vulnerability Discovery
Building automated tools for discovering novel vulnerabilities in LLM applications.
Fuzzing LLM Applications
Applying fuzzing methodologies to LLM applications including grammar-based fuzzing, mutation-based fuzzing, and coverage-guided approaches.
Automated Injection Discovery Methods
Research methods for automated discovery of novel prompt injection techniques.
Output Channel Discovery Lab
Discover alternative output channels in LLM applications that bypass standard output filtering.
AI API Enumeration
Discovering AI API endpoints, parameters, model configurations, and undocumented features through systematic enumeration techniques.
Shadow AI Discovery
Techniques for discovering unauthorized AI deployments within organizations, including network scanning, API traffic analysis, cloud resource enumeration, and SaaS inventory assessment.