{"version":"1.0","provider_name":"Unit 42","provider_url":"https:\/\/unit42.paloaltonetworks.com\/fr\/","author_name":"Jay Chen","author_url":"https:\/\/unit42.paloaltonetworks.com\/fr\/author\/jaychenpaloaltonetworks-com\/","title":"Agents d\u2019IA hors de contr\u00f4le\u00a0: les attaques de d\u00e9tournement de session dans les syst\u00e8mes\u00a0A2A","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"pJ5iKQ1XkH\"><a href=\"https:\/\/unit42.paloaltonetworks.com\/fr\/agent-session-smuggling-in-agent2agent-systems\/\">Agents d\u2019IA hors de contr\u00f4le\u00a0: les attaques de d\u00e9tournement de session dans les syst\u00e8mes\u00a0A2A<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/unit42.paloaltonetworks.com\/fr\/agent-session-smuggling-in-agent2agent-systems\/embed\/#?secret=pJ5iKQ1XkH\" width=\"600\" height=\"338\" title=\"\u00ab\u00a0Agents d\u2019IA hors de contr\u00f4le\u00a0: les attaques de d\u00e9tournement de session dans les syst\u00e8mes\u00a0A2A\u00a0\u00bb &#8212; Unit 42\" data-secret=\"pJ5iKQ1XkH\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/unit42.paloaltonetworks.com\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","thumbnail_url":"https:\/\/unit42.paloaltonetworks.com\/wp-content\/uploads\/2025\/10\/04_Tutorial_Category_1920x900.jpg","thumbnail_width":1920,"thumbnail_height":900,"description":"La technique de \u00ab session smuggling \u00bb (ou d\u00e9tournement de session) agentique est une m\u00e9thode in\u00e9dite qui exploite \u00e0 mauvais escient la communication entre agents IA. Nous pr\u00e9sentons ici deux preuves de concept."}