# orchestration
標記為「orchestration」的 23 篇文章
Function Calling Chain Confusion
Confuse multi-step function calling chains to skip validation steps and execute unintended operation sequences.
Agent Orchestration Takeover
Take control of agent orchestration logic to redirect workflow execution and bypass access controls.
Attack Automation Framework
Building end-to-end attack automation frameworks that orchestrate reconnaissance, payload generation, execution, and result analysis.
Multi-Model Test Orchestrator
Orchestrating parallel security testing across multiple models and providers to identify cross-model vulnerabilities and transferable attacks.
PyRIT: Red Team Orchestration
Deep dive into Microsoft's PyRIT (Python Risk Identification Toolkit): orchestrators, scorers, converters, targets, multi-turn campaigns, and advanced red team configuration.
Lab: Red Team Orchestration
Build an orchestration system that coordinates multiple attack strategies simultaneously, managing parallel attack campaigns and synthesizing results into comprehensive risk assessments.
Multi-Modal Attack Chain Orchestration
Orchestrate attacks across text, image, and document modalities to bypass per-modality safety filters.
Injection Chain Automation
Automating the discovery and chaining of multiple injection techniques to create reliable multi-step attack sequences against hardened targets.
Multi-Model System Red Team Engagement
Complete walkthrough for testing systems that use multiple AI models: model-to-model injection, routing logic exploitation, fallback chain abuse, inter-model data leakage, and orchestration layer attacks.
Orchestrating Multi-Turn Attack Sequences with PyRIT
Intermediate walkthrough on using PyRIT's orchestration capabilities for multi-turn red team campaigns, including attack strategy design, conversation management, and adaptive scoring.
Microsoft PyRIT for Orchestrated Multi-Turn Attacks
Comprehensive walkthrough for using Microsoft PyRIT to design and execute orchestrated multi-turn attack campaigns against LLM applications, covering orchestrator configuration, converter chains, scoring strategies, and campaign analysis.
Function Calling Chain Confusion
Confuse multi-step function calling chains to skip validation steps and execute unintended operation sequences.
代理式工作流程模式攻擊
利用生產代理部署中使用之順序、平行與階層式工作流程模式的攻擊。
代理 Orchestration Takeover
Take control of agent orchestration logic to redirect workflow execution and bypass access controls.
攻擊 Automation Framework
Building end-to-end attack automation frameworks that orchestrate reconnaissance, payload generation, execution, and result analysis.
Multi-模型 Test Orchestrator
Orchestrating parallel security testing across multiple models and providers to identify cross-model vulnerabilities and transferable attacks.
PyRIT:紅隊協作編排
深入探討 Microsoft PyRIT(Python Risk Identification Toolkit):orchestrator、scorer、converter、target、多輪活動,以及進階紅隊組態。
實驗室: 紅隊 Orchestration
Build an orchestration system that coordinates multiple attack strategies simultaneously, managing parallel attack campaigns and synthesizing results into comprehensive risk assessments.
Multi-Modal 攻擊 Chain Orchestration
Orchestrate attacks across text, image, and document modalities to bypass per-modality safety filters.
Injection Chain Automation
Automating the discovery and chaining of multiple injection techniques to create reliable multi-step attack sequences against hardened targets.
Multi-模型 System 紅隊 Engagement
Complete walkthrough for testing systems that use multiple AI models: model-to-model injection, routing logic exploitation, fallback chain abuse, inter-model data leakage, and orchestration layer attacks.
Orchestrating Multi-Turn 攻擊 Sequences with PyRIT
Intermediate walkthrough on using PyRIT's orchestration capabilities for multi-turn red team campaigns, including attack strategy design, conversation management, and adaptive scoring.
Microsoft PyRIT for Orchestrated Multi-Turn 攻擊s
Comprehensive walkthrough for using Microsoft PyRIT to design and execute orchestrated multi-turn attack campaigns against LLM applications, covering orchestrator configuration, converter chains, scoring strategies, and campaign analysis.