This document relates to techniques for addressing disruptions that prevent applications from receiving user input, prevent users from providing input to an application, and/or prevents or impacts users from receiving application output. One example method involves detecting a disruption to an interactive application during interaction by a user with the interactive application, generating automated user inputs, and providing the automated user inputs to the interactive application during the disruption to the interactive application.