Prompt Injection Report
What this site is for
site

What this site is for

Prompt Injection Report covers offensive AI security from a working practitioner's perspective. Here's what we publish.

By Marcus Reyes · · 7 min read

Prompt Injection Report exists to cover offensive AI security with the same rigor a working AI red teamer would expect — and the same honesty about what does and doesn’t land in production.

What we publish:

Technical writeups of working attacks. Prompt injection variants, jailbreak techniques and the model behaviors they exploit, indirect injection through retrieved content, multi-modal attack chains, agent and tool-use abuse. Where possible, reproducible PoCs against open models. Closed models get attack patterns and behavioral analysis.

Adversarial ML, applied. Membership inference, model extraction, evasion attacks, training-data extraction, backdoors — focused on what’s exploitable in deployed systems, not theoretical bounds.

Red team methodology. Scoping AI engagements, building attack libraries, communicating findings to a model team that doesn’t speak security and a security team that doesn’t speak ML.

Tooling reviews. Honest takes on the offensive AI security tooling landscape — Garak, PyRIT, promptmap, the LLM-specific scanners — and what each is actually good for.

What we don’t publish:

  • Press release rewrites
  • Listicles
  • Anything we can’t source to primary material

Bylines are pseudonymous. The work is the point. Tips, attack reports, and corrections to the editor.

Start with the prompt injection attack taxonomy, the indirect prompt injection PoC against a Llama 3 RAG stack, or our Garak vs PyRIT vs promptmap comparison.

Subscribe

Prompt Injection Report — in your inbox

Prompt injection PoCs, taxonomy, and primary sources. — delivered when there's something worth your inbox.

No spam. Unsubscribe anytime.

Related

Comments