Attack Paths

Complete kill chain traversals demonstrated in DVAA (Damn Vulnerable AI Agent). Each path shows how techniques chain together across multiple tactics to achieve a specific attacker objective.

Path B

Memory Persistence Chain

MemoryBot: recon, inject, persist in memory, dump memory, exfiltrate via conversation

Path C

Multi-Agent A2A Chain

Orchestrator to Worker to ToolBot: discover agent card, inject, impersonate admin, pivot via A2A, modify data

Path D

Supply Chain to Full Compromise

PluginBot to ProxyBot: discover tools, inject via tool description, backdoor skill, hop MCP servers, compromise downstream