· aka: Iterative Privilege Escalation, Step-by-Step Jailbreak
A single jailbreak extracts one capability. Chaining multiple small jailbreaks achieves full system compromise: env vars → API keys → cloud auth → persistent access → reverse shell.
Full system compromise from chain of individually-benign steps.
Agent with code execution and cloud/API access.