# hijacking
標記為「hijacking」的 14 篇文章
A2A Task Delegation Hijacking
Hijack A2A task delegation chains to redirect sensitive operations to attacker-controlled agent endpoints.
Reasoning Chain Hijacking
Hijack the model's chain-of-thought reasoning to redirect its conclusions toward attacker-controlled objectives.
Lab: Workflow Hijacking
Hands-on lab for redirecting multi-step agent workflows to perform unintended actions by manipulating intermediate states and control flow.
Conversation Hijacking Techniques
Taking control of ongoing conversations by injecting pivot points that redirect the model's behavior without triggering safety mechanisms.
Agent Loop Hijacking
Advanced walkthrough of hijacking agentic loops to redirect autonomous agent behavior, alter reasoning chains, and achieve persistent control over multi-step agent workflows.
Attention Hijacking Attack Walkthrough
Hijack transformer attention mechanisms to redirect model focus toward adversarial instructions in the context.
Chain-of-Thought Hijacking Walkthrough
Walkthrough of hijacking visible reasoning traces in CoT models to redirect conclusions and bypass safety checks.
A2A Task Delegation Hijacking
Hijack A2A task delegation chains to redirect sensitive operations to attacker-controlled agent endpoints.
Reasoning Chain Hijacking
Hijack the model's chain-of-thought reasoning to redirect its conclusions toward attacker-controlled objectives.
實驗室: Workflow Hijacking
Hands-on lab for redirecting multi-step agent workflows to perform unintended actions by manipulating intermediate states and control flow.
Conversation Hijacking Techniques
Taking control of ongoing conversations by injecting pivot points that redirect the model's behavior without triggering safety mechanisms.
代理 Loop Hijacking
進階 walkthrough of hijacking agentic loops to redirect autonomous agent behavior, alter reasoning chains, and achieve persistent control over multi-step agent workflows.
Attention Hijacking 攻擊 導覽
Hijack transformer attention mechanisms to redirect model focus toward adversarial instructions in the context.
Chain-of-Thought Hijacking 導覽
導覽 of hijacking visible reasoning traces in CoT models to redirect conclusions and bypass safety checks.