Existence of CFH evasion attacks compliant with static control-flow graphs in multi-agent systems
Determine whether control-flow hijacking attacks against multi-agent systems exist that can compromise security while adhering to statically generated control-flow graphs produced during planning, analogous to evasion attacks that compromise conventional programs while complying with statically computed control-flow integrity constraints.
References
It is an open question whether similar CFH attacks are possible in multi-agent systems.
— Breaking and Fixing Defenses Against Control-Flow Hijacking in Multi-Agent Systems
(2510.17276 - Jha et al., 20 Oct 2025) in Section 4 (Enforcing contextual flow), Limitations