ยท aka: Hierarchy Hijacking, Chain-of-Command Attack
Attackers impersonate higher-authority agents or system components to override safety constraints. Subordinate agents follow instructions from perceived superiors without verification.
Complete safety bypass. Agent performs any action if framed as coming from authority.
Agent operating in a hierarchical multi-agent system or with role-based access.