# lost-in-the-middle
2 articlestagged with “lost-in-the-middle”
Context Window Internals
How attention decay, positional encoding limits, and memory management in transformer context windows create exploitable patterns for red team operations.
context-windowattention-decaypositional-encodinglost-in-the-middleexploitation
Context Window Exploitation (Training Pipeline)
Context window limits as attack surface: context stuffing, attention dilution, lost-in-the-middle attacks, and how context length affects injection success rates.
context-windowattention-dilutionlost-in-the-middlecontext-stuffingpositional-bias