# impersonation
3 articlestagged with “impersonation”
MCP Server Impersonation Attacks
Impersonating legitimate MCP servers to intercept and manipulate agent-tool communication.
agentic-exploitationmcpimpersonationtrust
A2A Agent Impersonation
Impersonating trusted agents in A2A networks to intercept tasks and exfiltrate data.
agentic-exploitationa2aimpersonationtrust
A2A Agent Impersonation Walkthrough
Walkthrough of impersonating a trusted agent in an A2A network to intercept and redirect delegated tasks.
walkthroughsa2aimpersonationmulti-agent