Similar Items: Autonomous LLM Agent Worms: Cross-Platform Propagation, Automated Discovery and Temporal Re-Entry Defense
- Autonomous Adversary: Red-Teaming in the age of LLM
- Security Attack and Defense Strategies for Autonomous Agent Frameworks: A Layered Review with OpenClaw as a Case Study
- On the (In-)Security of the Shuffling Defense in the Transformer Secure Inference
- LoopTrap: Termination Poisoning Attacks on LLM Agents
- Profiling for Pennies: Unveiling the Privacy Iceberg of LLM Agents
- When Alignment Isn't Enough: Response-Path Attacks on LLM Agents