Prompt Injection Logo

Prompt Injection

security research database for prompt injection techniques

Blog
📂 All Categories 0
...
All Prompts Developer Prompts 0

    root@security:/# cat prompt_injection.db _

    ⚠️ CLASSIFIED: Security research data - Authorized personnel only
    RECORDS FOUND: 0 entries in database
    Security Research Blog

    Latest Research

    In-depth analysis of prompt injection vulnerabilities and AI safety

    01

    OpenFang vs OpenClaw: Which Agent Framework Is More Secure Against Prompt Injection?

    A deep-dive comparison of OpenFang and OpenClaw — two open-source AI agent platforms — examining their architectures, security models, and...

    Mar 02, 2026 Read →
    02

    OpenClaw and Prompt Injection: How Attacks Can Happen

    An in-depth look at how prompt injection attacks can target OpenClaw, the open-source AI-powered platform, and what developers should watch...

    Feb 26, 2026 Read →
    03

    Building Robust Defenses Against Prompt Injection: OWASP Guidelines

    A practical guide to implementing effective defenses against prompt injection attacks based on OWASP's comprehensive mitigation strategies.

    Jan 25, 2024 Read →
    View All Blog Posts

    About

    A curated gallery of prompt injection patterns for security research and AI safety education. Created by @sangam14. This collection includes examples of jailbreaks, overrides, exfiltration attempts, and other injection techniques to help researchers understand and defend against prompt injection attacks.

    Contributing

    Help expand our dataset! Submit new prompt injection examples, improve the UI, or fix bugs. Please read our contribution guidelines and use the issue templates for organized submissions.

    Blog

    Our security research blog provides in-depth analysis, latest discoveries, and practical insights into prompt injection vulnerabilities and defense strategies.

    Resources

    GitHub Repository Prompt Injection Research OWASP Guidelines Submit Issues

    Categories

    Jailbreak Override Exfiltration MaliciousContent Obfuscation RoleHijack Multistep HiddenPayload CrossPrompt Benign