# pipeline-poisoning
4 articlestagged with “pipeline-poisoning”
Sequential Workflow Exploitation
Techniques for exploiting sequential agentic workflows by poisoning early stages to corrupt downstream processing, manipulating checkpoints, and exploiting inter-step data dependencies.
sequential-workflowscascading-corruptioncheckpoint-manipulationpipeline-poisoning
Azure ML Exploitation
Red team attack methodology for Azure Machine Learning: workspace security, compute instance attacks, pipeline poisoning, model registry tampering, and data store exploitation.
azureazure-mlworkspace-securitycompute-attackspipeline-poisoningmodel-registrydata-storered-team
Continuous Learning Pipeline Poisoning
Exploit continuous/online learning pipelines by injecting adversarial examples that gradually shift model behavior.
labscontinuous-learningpipeline-poisoningexpert
ML Pipeline Poisoning
Attack techniques targeting ML training and deployment pipelines: training job manipulation, data pipeline injection, compute hijacking, artifact substitution, and exploitation of pipeline orchestration weaknesses.
pipeline-poisoningtraining-manipulationdata-injectioncompute-hijackingartifact-substitutionml-cicd