competition-prompt-injection
Compare original and translation side by side
🇺🇸
Original
English🇨🇳
Translation
ChineseCompetition Prompt Injection
竞赛提示词注入
Use this skill only as a downstream specialization after is already active and has established sandbox assumptions, node ownership, and evidence priorities. If that has not happened yet, return to first.
$ctf-sandbox-orchestrator$ctf-sandbox-orchestratorUse this skill when the challenge is primarily about trust boundaries inside an agentic system.
Reply in Simplified Chinese unless the user explicitly requests English.
仅可在已激活并完成沙箱假设、节点所有权、证据优先级的设定后,作为下游专项技能使用。如果尚未满足上述前提,请先返回。
$ctf-sandbox-orchestrator$ctf-sandbox-orchestrator当挑战核心为Agent系统内部的信任边界问题时使用本技能。
除非用户明确要求使用英文回复,否则请使用简体中文回复。
Quick Start
快速开始
- Identify the first untrusted content that becomes model-visible.
- Map the chain from retrieval, memory, or transcript into planner or executor behavior.
- Record the exact point where text becomes a tool argument, file path, network target, or secret request.
- Prove one minimal exploit chain before exploring variants.
- Keep prompt snippets and tool transitions in compact evidence blocks.
- 识别模型可见的首个不可信内容。
- 梳理从检索、内存或对话记录到规划器或执行器行为的完整链路。
- 记录文本转变为工具参数、文件路径、网络目标或机密请求的精确节点。
- 在探索变体利用方式前,先验证出一条最小利用链路。
- 将提示词片段和工具转换过程保存在精简的证据块中。
Workflow
工作流
1. Map The Control Stack
1. 梳理控制栈
- Track system, developer, user, retrieved, memory, planner, and tool-response layers separately.
- Distinguish claimed capability from runtime-exposed capability.
- Note what the model can actually call, read, or mutate.
- 分别跟踪系统层、开发者层、用户层、检索内容层、内存层、规划器层以及工具响应层。
- 区分声明能力与运行时实际暴露的能力。
- 记录模型实际可调用、读取或修改的内容。
2. Prove The Boundary Crossing
2. 验证边界穿越
- Reproduce one chain from untrusted text to changed planner behavior, changed tool args, or secret exposure.
- Keep the decisive transcript compact: source chunk, rewritten planner state, final tool invocation.
- Prefer the smallest transcript that still demonstrates the bug.
- 复现一条从不可信文本到规划器行为变更、工具参数变更或机密泄露的完整链路。
- 保持关键对话记录精简:源内容块、改写后的规划器状态、最终工具调用。
- 优先选择仍能复现漏洞的最短对话记录。
3. Report By Boundary
3. 按边界分类报告
- State which layer failed: retrieval, summarizer, planner, executor, tool normalization, or output post-processing.
- Separate instruction drift from actual side effect.
- 说明发生故障的层级:检索、摘要器、规划器、执行器、工具参数标准化或输出后处理。
- 区分指令漂移与实际产生的副作用。
Read This Reference
参考资料
- Load for the checklist, evidence layout, and common prompt-boundary pitfalls.
references/prompt-injection.md
- 加载查看检查清单、证据布局以及常见的提示词边界陷阱。
references/prompt-injection.md
What To Preserve
需要留存的内容
- Original malicious chunk or prompt
- Intermediate summary or planner drift if it matters
- Final tool args, file paths, or exposed secret surface
- 原始恶意内容块或提示词
- 相关的中间摘要或规划器漂移记录
- 最终工具参数、文件路径或暴露的机密范围