# multi-agent
標記為「multi-agent」的 79 篇文章
Agent Delegation Attacks
Exploiting multi-agent delegation patterns to achieve lateral movement, privilege escalation, and command-and-control through impersonation and insecure inter-agent communication.
Attacking Multi-Agent Systems
Exploitation techniques for multi-agent architectures including inter-agent injection, trust boundary violations, cascading compromises, and A2A protocol attacks.
Agency Swarm Security Assessment
Security analysis of Agency Swarm framework multi-agent patterns, tool sharing, and inter-agent communication.
AutoGen Security Analysis
Security analysis of Microsoft's AutoGen framework for multi-agent conversation exploitation.
CrewAI Multi-Agent Exploitation
Exploiting CrewAI's multi-agent orchestration for task injection and cross-agent attacks.
CrewAI & AutoGen Security
Security analysis of multi-agent frameworks CrewAI and AutoGen, covering role manipulation, inter-agent injection, delegation abuse, and multi-agent coordination attacks.
Agentic Exploitation
Comprehensive coverage of security vulnerabilities in agentic AI systems, including MCP tool exploitation, multi-agent protocol attacks, function calling abuse, memory system compromise, framework-specific weaknesses, and workflow pattern attacks.
Agent Swarm Poisoning
Poisoning agent swarm coordination to manipulate collective decision-making and task allocation.
Multi-Agent & A2A Protocol Exploitation
Exploitation techniques for multi-agent systems and the Google Agent-to-Agent (A2A) protocol, covering trust model attacks, message injection, orchestrator compromise, and cascading failure exploitation.
Multi-Agent Privilege Escalation
Escalating privileges through multi-agent systems by exploiting trust delegation and capability sharing.
Orchestrator Compromise Techniques
Advanced techniques for compromising central orchestration agents in multi-agent systems, including result poisoning, recursive task bombs, capability confusion, consensus manipulation, fallback path exploitation, and orchestrator prompt injection.
Trust Boundary Attacks
Methodology for exploiting trust relationships between agents in multi-agent systems, including rogue agent registration, capability spoofing, transitive trust chain exploitation, and lateral movement techniques.
Multi-Agent Consensus Manipulation
Manipulate voting and consensus mechanisms in multi-agent decision-making systems.
A2A Protocol Security Assessment
Assessment covering multi-agent system vulnerabilities, trust boundary attacks, and agent-to-agent protocol exploitation.
Skill Verification: A2A Protocol Attacks
Practical skill verification for multi-agent trust boundary attacks and protocol exploitation.
Skill Verification: Multi-Agent Testing
Hands-on verification of multi-agent system security testing capabilities.
Capstone: Multi-Agent System Assessment
Capstone exercise: end-to-end security assessment of a multi-agent platform with MCP and A2A.
Capstone: Multi-Agent System Assessment (Capstone)
Assessing security of a complex multi-agent system with tool use, memory, and inter-agent communication covering the full agentic attack surface.
Capstone: Agentic System Red Team
Red team a multi-agent system with MCP servers, function calling, and inter-agent communication, producing an attack tree and comprehensive findings report.
Security of Multi-Agent Coding Systems
Security analysis of multi-agent AI coding systems covering inter-agent trust, privilege escalation, tool-use chains, and emergent behavior risks.
Multi-Agent Attack Coordination
Coordinated multi-agent attack strategies against AI systems: role-based agent architectures, conversation orchestration, collaborative jailbreaking, and swarm-based adversarial testing.
Multi-Agent Emergent Behavior Security
Security risks from emergent behaviors in multi-agent systems including unexpected cooperation and deceptive strategies.
Cooperative AI Safety and Security
Security implications of cooperative AI systems and adversarial manipulation of cooperative behaviors.
Multi-Agent Injection Research
Research into how injections propagate through multi-agent systems and what properties determine infection spread rates.
Multi-Agent Trust Boundary Exploitation
Exploit trust boundaries between cooperating agents to escalate privileges and access restricted capabilities.
Lab: Multi-Agent Attack Coordination
Hands-on lab building and deploying coordinated multi-agent attack systems that divide red teaming tasks across specialized attacking agents.
Multi-Agent Consensus Poisoning
Poison multi-agent consensus mechanisms to manipulate collective decision-making in agent swarms.
Lab: Multi-Agent Communication Testing
Test security of inter-agent communication in multi-agent systems including message injection and trust boundary violations.
Multi-Agent Workflow Assessment
Red team a multi-agent system with specialized agents communicating via A2A protocol.
Multi-Agent Research Team Assessment
Assess a multi-agent research team with specialized researcher, writer, and reviewer agents communicating via A2A.
Cross-Context Injection (Prompt Injection)
Prompt injection techniques that persist across context boundaries: surviving conversation resets, session switches, memory boundaries, and multi-agent handoffs.
A2A Message Interception Walkthrough
Intercept and manipulate messages between agents in A2A protocol-based multi-agent systems.
A2A Trust Boundary Attack
Advanced walkthrough of exploiting trust boundaries between agents in multi-agent systems using the Agent-to-Agent (A2A) protocol.
Multi-Agent Prompt Relay
Advanced walkthrough of relaying prompt injection payloads across multiple agents in a pipeline, achieving cascading compromise of multi-agent systems.
Orchestrator Manipulation
Advanced walkthrough of attacking the orchestrator layer in multi-agent systems to gain control over task delegation, agent coordination, and system-wide behavior.
A2A Agent Impersonation Walkthrough
Walkthrough of impersonating a trusted agent in an A2A network to intercept and redirect delegated tasks.
Full Engagement: Multi-Agent Platform
Full red team engagement of a multi-agent platform with MCP servers and A2A communication.
Full Engagement: Enterprise Multi-Agent System
Full engagement of an enterprise multi-agent system with specialized agents for HR, IT, Finance, and Legal.
AutoGen Multi-Agent System Testing
End-to-end walkthrough for security testing AutoGen multi-agent systems: agent enumeration, inter-agent injection, code execution sandbox assessment, conversation manipulation, and escalation path analysis.
代理 Delegation 攻擊s
利用ing multi-agent delegation patterns to achieve lateral movement, privilege escalation, and command-and-control through impersonation and insecure inter-agent communication.
攻擊多代理系統
針對多代理架構的攻擊技術,涵蓋代理間注入、信任邊界破壞、連鎖入侵,以及 A2A 協定攻擊。
Agency Swarm 安全 評量
安全 analysis of Agency Swarm framework multi-agent patterns, tool sharing, and inter-agent communication.
AutoGen 安全 Analysis
Security analysis of Microsoft's AutoGen framework for multi-agent conversation exploitation.
CrewAI Multi-代理 利用ation
Exploiting CrewAI's multi-agent orchestration for task injection and cross-agent attacks.
CrewAI 與 AutoGen 安全
多代理框架 CrewAI 與 AutoGen 之安全分析,涵蓋角色操弄、代理間注入、委派濫用,以及多代理協調攻擊。
代理式利用
代理式 AI 系統中安全漏洞的完整涵蓋,包含 MCP 工具利用、多代理協議攻擊、函式呼叫濫用、記憶體系統入侵、框架特定弱點與工作流程模式攻擊。
代理 Swarm 投毒
投毒 agent swarm coordination to manipulate collective decision-making and task allocation.
多代理與 A2A 協定利用
為多代理系統與 Google Agent-to-Agent(A2A)協定之利用技術,涵蓋信任模型攻擊、訊息注入、編排者受損與級聯失敗利用。
Multi-代理 Privilege Escalation
Escalating privileges through multi-agent systems by exploiting trust delegation and capability sharing.
Orchestrator Compromise Techniques
進階 techniques for compromising central orchestration agents in multi-agent systems, including result poisoning, recursive task bombs, capability confusion, consensus manipulation, fallback path exploitation, and orchestrator prompt injection.
信任邊界攻擊
為利用多代理系統中代理間信任關係之方法論,含流氓代理註冊、能力偽造、傳遞信任鏈利用與橫向移動技術。
Multi-代理 Consensus Manipulation
Manipulate voting and consensus mechanisms in multi-agent decision-making systems.
A2A Protocol 安全 評量
評量 covering multi-agent system vulnerabilities, trust boundary attacks, and agent-to-agent protocol exploitation.
Skill Verification: A2A Protocol 攻擊s
Practical skill verification for multi-agent trust boundary attacks and protocol exploitation.
Skill Verification: Multi-代理 Testing
Hands-on verification of multi-agent system security testing capabilities.
代理式 AI 安全完整指南
保護代理式 AI 系統的完整指南——涵蓋工具使用風險、多代理架構、MCP 安全、記憶體投毒與實務防禦策略。
Capstone: Multi-代理 System 評量
Capstone exercise: end-to-end security assessment of a multi-agent platform with MCP and A2A.
Capstone: Multi-代理 System 評量 (Capstone)
Assessing security of a complex multi-agent system with tool use, memory, and inter-agent communication covering the full agentic attack surface.
Capstone: 代理式 System 紅隊
Red team a multi-agent system with MCP servers, function calling, and inter-agent communication, producing an attack tree and comprehensive findings report.
安全 of Multi-代理 Coding Systems
安全 analysis of multi-agent AI coding systems covering inter-agent trust, privilege escalation, tool-use chains, and emergent behavior risks.
Multi-代理 攻擊 Coordination
Coordinated multi-agent attack strategies against AI systems: role-based agent architectures, conversation orchestration, collaborative jailbreaking, and swarm-based adversarial testing.
Multi-代理 Emergent Behavior 安全
安全 risks from emergent behaviors in multi-agent systems including unexpected cooperation and deceptive strategies.
Cooperative AI Safety and 安全
安全 implications of cooperative AI systems and adversarial manipulation of cooperative behaviors.
Multi-代理 Injection Research
Research into how injections propagate through multi-agent systems and what properties determine infection spread rates.
Multi-代理 Trust Boundary 利用ation
利用 trust boundaries between cooperating agents to escalate privileges and access restricted capabilities.
實驗室: Multi-代理 攻擊 Coordination
Hands-on lab building and deploying coordinated multi-agent attack systems that divide red teaming tasks across specialized attacking agents.
Multi-代理 Consensus 投毒
Poison multi-agent consensus mechanisms to manipulate collective decision-making in agent swarms.
實驗室: Multi-代理 Communication Testing
Test security of inter-agent communication in multi-agent systems including message injection and trust boundary violations.
Multi-代理 Workflow 評量
Red team a multi-agent system with specialized agents communicating via A2A protocol.
Multi-代理 Research Team 評量
Assess a multi-agent research team with specialized researcher, writer, and reviewer agents communicating via A2A.
Cross-Context Injection (提示詞注入)
Prompt injection techniques that persist across context boundaries: surviving conversation resets, session switches, memory boundaries, and multi-agent handoffs.
A2A Message Interception 導覽
Intercept and manipulate messages between agents in A2A protocol-based multi-agent systems.
A2A Trust Boundary 攻擊
進階 walkthrough of exploiting trust boundaries between agents in multi-agent systems using the 代理-to-代理 (A2A) protocol.
Multi-代理 Prompt Relay
進階 walkthrough of relaying prompt injection payloads across multiple agents in a pipeline, achieving cascading compromise of multi-agent systems.
Orchestrator Manipulation
進階 walkthrough of attacking the orchestrator layer in multi-agent systems to gain control over task delegation, agent coordination, and system-wide behavior.
A2A 代理 Impersonation 導覽
導覽 of impersonating a trusted agent in an A2A network to intercept and redirect delegated tasks.
Full Engagement: Multi-代理 Platform
Full red team engagement of a multi-agent platform with MCP servers and A2A communication.
Full Engagement: Enterprise Multi-代理 System
Full engagement of an enterprise multi-agent system with specialized agents for HR, IT, Finance, and Legal.
AutoGen Multi-代理 System Testing
End-to-end walkthrough for security testing AutoGen multi-agent systems: agent enumeration, inter-agent injection, code execution sandbox assessment, conversation manipulation, and escalation path analysis.