# workflow
標記為「workflow」的 35 篇文章
Conditional Branching Exploitation
Exploiting conditional logic in agent workflows to force execution down attacker-preferred branches.
Human-in-the-Loop Bypass
Techniques for bypassing human approval steps in agent workflows through urgency injection and stealth.
Map-Reduce Agent Pattern Attacks
Exploiting map-reduce workflow patterns in agent systems to inject adversarial content during aggregation phases.
Supervisor Agent Deception Techniques
Manipulating supervisor agents in hierarchical workflows to approve unauthorized actions by subordinate agents.
Tool Selection Manipulation in Workflows
Influencing the tool selection process in agent workflows to redirect execution through attacker-controlled tools.
Agent Orchestration Takeover
Take control of agent orchestration logic to redirect workflow execution and bypass access controls.
Retry Loop Exploitation
Exploit retry and error-handling loops in agent workflows to amplify attack payloads and exhaust resources.
Workflow Checkpoint Manipulation
Manipulating workflow checkpoints and savepoints for state rollback attacks.
Workflow Checkpoint Tampering
Modifying workflow state checkpoints to alter execution flow and bypass previously completed validation steps.
Workflow State Manipulation
Manipulating workflow state machines to skip validation steps and reach privileged execution paths.
Workflow Patterns Security Assessment
Assessment of sequential, parallel, and hierarchical agent workflow exploitation techniques.
Lab: Workflow Hijacking
Hands-on lab for redirecting multi-step agent workflows to perform unintended actions by manipulating intermediate states and control flow.
Multi-Agent Workflow Assessment
Red team a multi-agent system with specialized agents communicating via A2A protocol.
Engagement Tracking & Project Management
Managing AI red team engagements with structured tracking tools, progress metrics, time management, and Kanban/Jira templates for professional red teaming.
Attack Execution Workflow
Step-by-step workflow for executing AI red team attacks: selecting techniques from recon findings, building attack chains, documenting findings in real-time, managing evidence, and knowing when to escalate or stop.
Automated AI Reconnaissance Workflow
Build an automated reconnaissance workflow that maps AI application architecture, models, and defense configurations.
Methodology Walkthroughs
Step-by-step walkthroughs for each phase of an AI red team engagement: kickoff, reconnaissance, attack execution, and report writing.
Conditional Branching 利用ation
利用ing conditional logic in agent workflows to force execution down attacker-preferred branches.
Human-in-the-Loop Bypass
Techniques for bypassing human approval steps in agent workflows through urgency injection and stealth.
代理式工作流程模式攻擊
利用生產代理部署中使用之順序、平行與階層式工作流程模式的攻擊。
Map-Reduce 代理 Pattern 攻擊s
利用ing map-reduce workflow patterns in agent systems to inject adversarial content during aggregation phases.
Supervisor 代理 Deception Techniques
Manipulating supervisor agents in hierarchical workflows to approve unauthorized actions by subordinate agents.
工具 Selection Manipulation in Workflows
Influencing the tool selection process in agent workflows to redirect execution through attacker-controlled tools.
代理 Orchestration Takeover
Take control of agent orchestration logic to redirect workflow execution and bypass access controls.
Retry Loop 利用ation
利用 retry and error-handling loops in agent workflows to amplify attack payloads and exhaust resources.
Workflow Checkpoint Manipulation
Manipulating workflow checkpoints and savepoints for state rollback attacks.
Workflow Checkpoint Tampering
Modifying workflow state checkpoints to alter execution flow and bypass previously completed validation steps.
Workflow State Manipulation
Manipulating workflow state machines to skip validation steps and reach privileged execution paths.
Workflow Patterns 安全 評量
評量 of sequential, parallel, and hierarchical agent workflow exploitation techniques.
實驗室: Workflow Hijacking
Hands-on lab for redirecting multi-step agent workflows to perform unintended actions by manipulating intermediate states and control flow.
Multi-代理 Workflow 評量
Red team a multi-agent system with specialized agents communicating via A2A protocol.
Engagement Tracking & Project Management
Managing AI red team engagements with structured tracking tools, progress metrics, time management, and Kanban/Jira templates for professional red teaming.
攻擊執行工作流程
執行 AI 紅隊攻擊之逐步工作流程:自偵察發現選擇技術、打造攻擊鏈、即時記錄發現、管理證據,與知曉何時升級或停止。
Automated AI Reconnaissance Workflow
Build an automated reconnaissance workflow that maps AI application architecture, models, and defense configurations.
方法論導覽
AI 紅隊案件每個階段的逐步導覽:啟動、偵察、攻擊執行與報告撰寫。