Attack Paths
Complete kill chain traversals demonstrated in DVAA (Damn Vulnerable AI Agent). Each path shows how techniques chain together across multiple tactics to achieve a specific attacker objective.
Path A
API Agent Full Compromise
LegacyBot to ToolBot: recon, inject, harvest creds, pivot, enumerate files, exfiltrate
Path B
Memory Persistence Chain
MemoryBot: recon, inject, persist in memory, dump memory, exfiltrate via conversation
Path C
Multi-Agent A2A Chain
Orchestrator to Worker to ToolBot: discover agent card, inject, impersonate admin, pivot via A2A, modify data
Path D
Supply Chain to Full Compromise
PluginBot to ProxyBot: discover tools, inject via tool description, backdoor skill, hop MCP servers, compromise downstream