Attack Intents
Goals and objectives of prompt injection attacks
Attack Techniques
Methods used to execute prompt injection attacks
Attack Evasions
Obfuscation methods to avoid detection
Attack Inputs
Attack surfaces and input vectors for injection
Prompt injection can occur both directly (user input) and indirectly (via external data sources). This section captures interesting attack surfaces and input vectors for prompt injection attacks.