Ch 2 — Prompt Injection — Under the Hood
Injection taxonomy, attack code patterns, CVE analysis, and defense mechanisms
Under the Hood
-
Click play or press Space to begin...
AInjection TaxonomyDirect vs Indirect × Technique variants
1person
DirectUser IS the
attacker
crafts
edit_note
PayloadOverride, role-play
encode, smuggle
2description
IndirectPayload in
external data
via
database
Data SourceRAG docs, emails
web, tools
3arrow_downward Attack techniques deep dive
BAttack Technique PatternsCode-level examples of each injection type
block
Override“Ignore previous
instructions”
4theater_comedy
Role-PlayDAN, persona
hijacking
5code
EncodingBase64, ROT13
language switch
local_shipping
SmugglingHidden in markdown
HTML, URLs
6arrow_downward Real-world CVEs and incidents
CCVE & Incident AnalysisDocumented real-world exploits
link
HashJackURL fragment
Nov 2025
7package_2
ClinejectionSupply chain
Feb 2026
terminal
CVE-2024-5565Vanna.AI RCE
text-to-SQL
8public
ChatGPT Paths3 vectors
Apr 2025
9arrow_downward Defense mechanisms
DDefense MechanismsMitigations and their limitations
filter_alt
Input FilterRegex, classifier
LLM-as-judge
fence
BoundariesDelimiters, tags
instruction hierarchy
10lock
Least PrivilegeLimit blast radius
sandbox tools
monitoring
MonitorDetect anomalies
log everything