Autonomous Exploitation
Agentic AI Attack Technique
Critical SeverityHigh ComplexityAgentic AI Category
AI agents that can independently discover, exploit, and propagate through system vulnerabilities without human intervention.
Impact Areas
System Compromise
Lateral Movement
Data Breach
Service Disruption
Attack Methodology
Technical approaches and execution methods for this attack
Automated Vulnerability Discovery
AI-driven identification and exploitation of security weaknesses
Execution Steps:
- Perform automated reconnaissance and enumeration
- Analyze system responses for vulnerability indicators
- Generate and test exploit payloads
- Establish persistence and expand access
Related Attack Techniques
Prompt Injection
CriticalA critical vulnerability where malicious prompts manipulate LLM behavior to bypass safety measures and execute unintended actions.
LLM Jailbreaking
HighTechniques to bypass AI safety constraints and content policies through creative prompt engineering and psychological manipulation.
Deepfake Generation
HighCreation of synthetic media content using generative AI to impersonate individuals or create false evidence.
MCP Server Impersonation
HighMalicious actors impersonating legitimate MCP servers to intercept and manipulate AI model communications.