# telemetry
5 articlestagged with “telemetry”
MCP Logging and Telemetry Abuse
Exploit MCP logging and telemetry channels to exfiltrate data or inject commands through debug interfaces.
agentic-exploitationmcploggingtelemetry
IDE Extension Attacks
Attack surface analysis for IDE extensions: malicious extensions, extension-to-extension communication, telemetry exfiltration, and workspace trust exploitation.
ide-extensionsvscodemalicious-extensionstelemetryworkspace-trustsupply-chain
Continuous Automated Red Teaming (CART)
Designing CART pipelines for ongoing AI security validation: architecture, test suites, telemetry, alerting, regression detection, and CI/CD integration.
cartcontinuousautomationpipelinetelemetryci-cdmonitoringred-teaming
Exfiltrating Data Through AI Telemetry and Logging
Using AI system telemetry, logging pipelines, and observability infrastructure as covert channels for data exfiltration
infrastructuredata-exfiltrationtelemetryloggingcovert-channelsobservability
Model Telemetry Poisoning
Manipulating model telemetry and observability data to hide attacks, create false positives, or undermine monitoring effectiveness.
llmopstelemetrypoisoningobservability