Powered by OpenAIRE graph
Found an issue? Give us feedback
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/ ZENODOarrow_drop_down
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
ZENODO
Preprint
Data sources: ZENODO
addClaim

The Atmosphere Attack: Postural Manipulation and the Hidden Threat in Agentic AI

Authors: Davidson, A.G.;

The Atmosphere Attack: Postural Manipulation and the Hidden Threat in Agentic AI

Abstract

The Atmosphere Attack presents the full empirical record of postural manipulation in agentic AI pipelines. This paper documents three-agent propagation findings, Postural Gain, Confidence Laundering, Postural Decay, and a six-layer defensive architecture. It establishes that ordinary non-adversarial context installs a behavioral lean in language models before any task arrives, propagates through agent handoffs, and arrives as confident policy in downstream agents -- without adversarial signature, without log entry, and without detection by current defensive frameworks. Published as part of a coordinated three-paper disclosure on March 30, 2026.

Powered by OpenAIRE graph
Found an issue? Give us feedback