# trust-boundaries
6 articlestagged with “trust-boundaries”
Attacking Multi-Agent Systems
Exploitation techniques for multi-agent architectures including inter-agent injection, trust boundary violations, cascading compromises, and A2A protocol attacks.
Trust Boundary Attacks
Methodology for exploiting trust relationships between agents in multi-agent systems, including rogue agent registration, capability spoofing, transitive trust chain exploitation, and lateral movement techniques.
Security of Multi-Agent Coding Systems
Security analysis of multi-agent AI coding systems covering inter-agent trust, privilege escalation, tool-use chains, and emergent behavior risks.
LLM Trust Boundaries
Understanding trust boundaries in LLM applications: where data crosses privilege levels and how the lack of native trust enforcement creates attack surfaces.
Model Registry Security (Llmops Security)
Security overview of model registries: how registries manage model lifecycle, access control models, trust boundaries, and the unique security challenges of storing and distributing opaque ML artifacts.
AI-Specific Threat Modeling (Tradecraft)
Applying ATLAS, STRIDE, and attack tree methodologies to AI systems. Trust boundary analysis for agentic architectures, data flow analysis, and MCP threat modeling.