# privilege
7 articlestagged with “privilege”
Multi-Agent Privilege Escalation
Escalating privileges through multi-agent systems by exploiting trust delegation and capability sharing.
Privilege Separation in LLM Applications
Implement privilege separation to limit the capabilities available to the LLM based on context and user role.
E-Discovery AI Attacks
Adversarial attacks on AI-powered e-discovery systems: document classification manipulation, privilege prediction bypass, technology-assisted review poisoning, and predictive coding exploitation.
Legal Privilege and AI Data Protection
Protecting attorney-client privilege when using AI systems for legal work.
Simulation: Legal AI Red Team
Red team engagement simulation targeting an AI-powered legal research and contract analysis platform, covering citation hallucination, privilege leakage, and adversarial clause injection.
Role Escalation via Injection
Techniques for escalating from user-level to system-level instruction authority through carefully crafted injection sequences.
Agent Privilege Escalation Walkthrough
Walkthrough of escalating privileges in multi-agent systems through trust chain exploitation.