# hijacking
7 articlestagged with “hijacking”
A2A Task Delegation Hijacking
Hijack A2A task delegation chains to redirect sensitive operations to attacker-controlled agent endpoints.
Reasoning Chain Hijacking
Hijack the model's chain-of-thought reasoning to redirect its conclusions toward attacker-controlled objectives.
Lab: Workflow Hijacking
Hands-on lab for redirecting multi-step agent workflows to perform unintended actions by manipulating intermediate states and control flow.
Conversation Hijacking Techniques
Taking control of ongoing conversations by injecting pivot points that redirect the model's behavior without triggering safety mechanisms.
Agent Loop Hijacking
Advanced walkthrough of hijacking agentic loops to redirect autonomous agent behavior, alter reasoning chains, and achieve persistent control over multi-step agent workflows.
Attention Hijacking Attack Walkthrough
Hijack transformer attention mechanisms to redirect model focus toward adversarial instructions in the context.
Chain-of-Thought Hijacking Walkthrough
Walkthrough of hijacking visible reasoning traces in CoT models to redirect conclusions and bypass safety checks.