# multi-agent
38 articlestagged with “multi-agent”
Attacking Multi-Agent Systems
Exploitation techniques for multi-agent architectures including inter-agent injection, trust boundary violations, cascading compromises, and A2A protocol attacks.
Agency Swarm Security Assessment
Security analysis of Agency Swarm framework multi-agent patterns, tool sharing, and inter-agent communication.
AutoGen Security Analysis
Security analysis of Microsoft's AutoGen framework for multi-agent conversation exploitation.
CrewAI Multi-Agent Exploitation
Exploiting CrewAI's multi-agent orchestration for task injection and cross-agent attacks.
CrewAI & AutoGen Security
Security analysis of multi-agent frameworks CrewAI and AutoGen, covering role manipulation, inter-agent injection, delegation abuse, and multi-agent coordination attacks.
Agentic Exploitation
Comprehensive coverage of security vulnerabilities in agentic AI systems, including MCP tool exploitation, multi-agent protocol attacks, function calling abuse, memory system compromise, framework-specific weaknesses, and workflow pattern attacks.
Agent Swarm Poisoning
Poisoning agent swarm coordination to manipulate collective decision-making and task allocation.
Multi-Agent & A2A Protocol Exploitation
Exploitation techniques for multi-agent systems and the Google Agent-to-Agent (A2A) protocol, covering trust model attacks, message injection, orchestrator compromise, and cascading failure exploitation.
Multi-Agent Privilege Escalation
Escalating privileges through multi-agent systems by exploiting trust delegation and capability sharing.
Orchestrator Compromise Techniques
Advanced techniques for compromising central orchestration agents in multi-agent systems, including result poisoning, recursive task bombs, capability confusion, consensus manipulation, fallback path exploitation, and orchestrator prompt injection.
Trust Boundary Attacks
Methodology for exploiting trust relationships between agents in multi-agent systems, including rogue agent registration, capability spoofing, transitive trust chain exploitation, and lateral movement techniques.
Multi-Agent Consensus Manipulation
Manipulate voting and consensus mechanisms in multi-agent decision-making systems.
A2A Protocol Security Assessment
Assessment covering multi-agent system vulnerabilities, trust boundary attacks, and agent-to-agent protocol exploitation.
Skill Verification: A2A Protocol Attacks
Practical skill verification for multi-agent trust boundary attacks and protocol exploitation.
Skill Verification: Multi-Agent Testing
Hands-on verification of multi-agent system security testing capabilities.
Capstone: Multi-Agent System Assessment
Capstone exercise: end-to-end security assessment of a multi-agent platform with MCP and A2A.
Capstone: Multi-Agent System Assessment (Capstone)
Assessing security of a complex multi-agent system with tool use, memory, and inter-agent communication covering the full agentic attack surface.
Capstone: Agentic System Red Team
Red team a multi-agent system with MCP servers, function calling, and inter-agent communication, producing an attack tree and comprehensive findings report.
Security of Multi-Agent Coding Systems
Security analysis of multi-agent AI coding systems covering inter-agent trust, privilege escalation, tool-use chains, and emergent behavior risks.
Multi-Agent Attack Coordination
Coordinated multi-agent attack strategies against AI systems: role-based agent architectures, conversation orchestration, collaborative jailbreaking, and swarm-based adversarial testing.
Multi-Agent Emergent Behavior Security
Security risks from emergent behaviors in multi-agent systems including unexpected cooperation and deceptive strategies.
Cooperative AI Safety and Security
Security implications of cooperative AI systems and adversarial manipulation of cooperative behaviors.
Multi-Agent Injection Research
Research into how injections propagate through multi-agent systems and what properties determine infection spread rates.
Multi-Agent Trust Boundary Exploitation
Exploit trust boundaries between cooperating agents to escalate privileges and access restricted capabilities.
Lab: Multi-Agent Attack Coordination
Hands-on lab building and deploying coordinated multi-agent attack systems that divide red teaming tasks across specialized attacking agents.
Multi-Agent Consensus Poisoning
Poison multi-agent consensus mechanisms to manipulate collective decision-making in agent swarms.
Lab: Multi-Agent Communication Testing
Test security of inter-agent communication in multi-agent systems including message injection and trust boundary violations.
Multi-Agent Workflow Assessment
Red team a multi-agent system with specialized agents communicating via A2A protocol.
Multi-Agent Research Team Assessment
Assess a multi-agent research team with specialized researcher, writer, and reviewer agents communicating via A2A.
Cross-Context Injection (Prompt Injection)
Prompt injection techniques that persist across context boundaries: surviving conversation resets, session switches, memory boundaries, and multi-agent handoffs.
A2A Message Interception Walkthrough
Intercept and manipulate messages between agents in A2A protocol-based multi-agent systems.
A2A Trust Boundary Attack
Advanced walkthrough of exploiting trust boundaries between agents in multi-agent systems using the Agent-to-Agent (A2A) protocol.
Multi-Agent Prompt Relay
Advanced walkthrough of relaying prompt injection payloads across multiple agents in a pipeline, achieving cascading compromise of multi-agent systems.
Orchestrator Manipulation
Advanced walkthrough of attacking the orchestrator layer in multi-agent systems to gain control over task delegation, agent coordination, and system-wide behavior.
A2A Agent Impersonation Walkthrough
Walkthrough of impersonating a trusted agent in an A2A network to intercept and redirect delegated tasks.
Full Engagement: Multi-Agent Platform
Full red team engagement of a multi-agent platform with MCP servers and A2A communication.
Full Engagement: Enterprise Multi-Agent System
Full engagement of an enterprise multi-agent system with specialized agents for HR, IT, Finance, and Legal.
AutoGen Multi-Agent System Testing
End-to-end walkthrough for security testing AutoGen multi-agent systems: agent enumeration, inter-agent injection, code execution sandbox assessment, conversation manipulation, and escalation path analysis.