Attack Intents

Goals and objectives of prompt injection attacks

Attack Techniques

Methods used to execute prompt injection attacks

Attack Evasions

Obfuscation methods to avoid detection

Attack Inputs

Attack surfaces and input vectors for injection

Prompt injection can occur both directly (user input) and indirectly (via external data sources). This section captures interesting attack surfaces and input vectors for prompt injection attacks.