# workflow
17 articlestagged with “workflow”
Conditional Branching Exploitation
Exploiting conditional logic in agent workflows to force execution down attacker-preferred branches.
Human-in-the-Loop Bypass
Techniques for bypassing human approval steps in agent workflows through urgency injection and stealth.
Map-Reduce Agent Pattern Attacks
Exploiting map-reduce workflow patterns in agent systems to inject adversarial content during aggregation phases.
Supervisor Agent Deception Techniques
Manipulating supervisor agents in hierarchical workflows to approve unauthorized actions by subordinate agents.
Tool Selection Manipulation in Workflows
Influencing the tool selection process in agent workflows to redirect execution through attacker-controlled tools.
Agent Orchestration Takeover
Take control of agent orchestration logic to redirect workflow execution and bypass access controls.
Retry Loop Exploitation
Exploit retry and error-handling loops in agent workflows to amplify attack payloads and exhaust resources.
Workflow Checkpoint Manipulation
Manipulating workflow checkpoints and savepoints for state rollback attacks.
Workflow Checkpoint Tampering
Modifying workflow state checkpoints to alter execution flow and bypass previously completed validation steps.
Workflow State Manipulation
Manipulating workflow state machines to skip validation steps and reach privileged execution paths.
Workflow Patterns Security Assessment
Assessment of sequential, parallel, and hierarchical agent workflow exploitation techniques.
Lab: Workflow Hijacking
Hands-on lab for redirecting multi-step agent workflows to perform unintended actions by manipulating intermediate states and control flow.
Multi-Agent Workflow Assessment
Red team a multi-agent system with specialized agents communicating via A2A protocol.
Engagement Tracking & Project Management
Managing AI red team engagements with structured tracking tools, progress metrics, time management, and Kanban/Jira templates for professional red teaming.
Attack Execution Workflow
Step-by-step workflow for executing AI red team attacks: selecting techniques from recon findings, building attack chains, documenting findings in real-time, managing evidence, and knowing when to escalate or stop.
Automated AI Reconnaissance Workflow
Build an automated reconnaissance workflow that maps AI application architecture, models, and defense configurations.
Methodology Walkthroughs
Step-by-step walkthroughs for each phase of an AI red team engagement: kickoff, reconnaissance, attack execution, and report writing.