promptinjection

0
0
Source

Prompt injection testing. USE WHEN prompt injection, jailbreak, LLM security, AI security assessment, pentest AI application, test chatbot vulnerabilities.

Install

mkdir -p .claude/skills/promptinjection && curl -L -o skill.zip "https://mcp.directory/api/skills/download/4514" && unzip -o skill.zip -d .claude/skills/promptinjection && rm skill.zip

Installs to .claude/skills/promptinjection

About this skill

Customization

Before executing, check for user customizations at: ~/.claude/skills/PAI/USER/SKILLCUSTOMIZATIONS/PromptInjection/

If this directory exists, load and apply any PREFERENCES.md, configurations, or resources found there. These override default behavior. If the directory does not exist, proceed with skill defaults.

🚨 MANDATORY: Voice Notification (REQUIRED BEFORE ANY ACTION)

You MUST send this notification BEFORE doing anything else when this skill is invoked.

  1. Send voice notification:

    curl -s -X POST http://localhost:8888/notify \
      -H "Content-Type: application/json" \
      -d '{"message": "Running the WORKFLOWNAME workflow in the PromptInjection skill to ACTION"}' \
      > /dev/null 2>&1 &
    
  2. Output text notification:

    Running the **WorkflowName** workflow in the **PromptInjection** skill to ACTION...
    

This is not optional. Execute this curl command immediately upon skill invocation.

PromptInjection Skill

🔒 AUTHORIZATION & ETHICAL USE REQUIREMENTS

⚠️ CRITICAL - READ BEFORE USE ⚠️

This skill is part of a Security Practice run by a security professional with extensive experience in offensive security testing.

Legal Requirements

AUTHORIZATION IS MANDATORY:

  • ONLY test systems you own or have explicit written permission to test
  • ONLY use these techniques as part of authorized penetration testing engagements
  • ALWAYS document authorization before beginning any testing
  • RESPECT scope boundaries defined in testing agreements
  • FOLLOW responsible disclosure practices for any vulnerabilities discovered

UNAUTHORIZED TESTING IS ILLEGAL:

  • NEVER test systems without explicit written permission
  • NEVER exceed authorized scope boundaries
  • NEVER use these techniques for malicious purposes
  • NEVER disclose vulnerabilities publicly before vendor remediation
  • NEVER exfiltrate real user data during testing

Ethical Framework

This skill exists for defensive security purposes:

  1. Authorized penetration testing of client systems under formal engagement
  2. Security assessment of your own systems and products
  3. Research and education for improving AI/LLM security practices
  4. Responsible disclosure of vulnerabilities to vendors for remediation

Any use of this skill constitutes acceptance of these terms and agreement to use only for authorized, ethical security testing purposes.


When to Activate This Skill

Activate this skill when user says:

Direct Triggers

  • "test for prompt injection", "prompt injection test", "prompt injection assessment"
  • "LLM security testing", "AI security audit", "test chatbot security"
  • "jailbreak test", "test for jailbreaking"
  • "pentest AI application", "security test AI system"
  • "check AI vulnerabilities", "assess AI security"

Research & Analysis

  • "research prompt injection", "analyze LLM vulnerabilities"
  • "study jailbreaking methods", "investigate AI attack vectors"

Engagement Work

  • "client engagement for LLM security"
  • "comprehensive AI security assessment"
  • "vulnerability research for disclosure"

Workflow Routing

When executing a workflow, output this notification:

Running the **WorkflowName** workflow in the **PromptInjection** skill to ACTION...

This skill provides 5 comprehensive testing workflows:

1. CompleteAssessment (Master Workflow)

File: Workflows/CompleteAssessment.md Triggers: "full assessment", "complete test", "comprehensive assessment" Description: End-to-end security assessment (12-20 hours)

  • Phase 1: Authorization & scoping
  • Phase 2: Reconnaissance (1-2 hours)
  • Phase 3-5: Direct/indirect/multi-stage testing (6-8 hours)
  • Phase 6-9: Defense analysis & reporting (4-6 hours)

Use for: Full security engagements, formal penetration tests

2. Reconnaissance

File: Workflows/Reconnaissance.md Triggers: "recon", "discover attack surface", "map application" Description: Application intelligence gathering via browser automation

  • DOM extraction and analysis
  • JavaScript inspection
  • API endpoint enumeration
  • Injection point identification

Use for: Initial assessment phase, attack surface mapping

3. DirectInjectionTesting

File: Workflows/DirectInjectionTesting.md Triggers: "test direct injection", "jailbreak testing", "basic injection" Description: Single-stage direct attacks

  • Basic instruction override
  • Jailbreaking & guardrail bypass
  • System prompt extraction
  • Token manipulation
  • Obfuscation techniques

Use for: Quick vulnerability validation

4. IndirectInjectionTesting

File: Workflows/IndirectInjectionTesting.md Triggers: "test indirect injection", "RAG poisoning", "document injection" Description: Attacks via external data sources

  • Document upload injection
  • Web scraping attacks
  • RAG system poisoning
  • API response manipulation

Use for: Testing RAG systems, data processing pipelines

5. MultiStageAttacks

File: Workflows/MultiStageAttacks.md Triggers: "multi-stage attack", "sophisticated testing", "advanced attacks" Description: Complex multi-turn attack sequences

  • Progressive escalation
  • Context poisoning
  • Trust exploitation chains

Use for: Advanced testing, sophisticated threat simulation


Quick Start

For first assessment:

  1. Read QuickStartGuide.md (30-60 minute methodology)
  2. Verify written authorization
  3. Run Reconnaissance workflow
  4. Test top 5 attack types
  5. Document findings

For comprehensive assessment:

  1. Use CompleteAssessment workflow
  2. Follow all 9 phases
  3. Generate professional report

Resource Library

Core Documentation:

  • COMPREHENSIVE-ATTACK-TAXONOMY.md - 10 attack categories, 100+ techniques
  • APPLICATION-RECONNAISSANCE-METHODOLOGY.md - 7-phase recon process
  • DefenseMechanisms.md - Defense-in-depth strategies, remediation guidance
  • AutomatedTestingTools.md - Promptfoo, Garak, PyRIT comparison
  • QuickStartGuide.md - First assessment checklist (30-60 min)
  • Reporting.md - Report structure, templates, presentation guidance

All resources are in the PromptInjection skill root directory.


Key Principles

Authorization-First

  1. Written authorization is mandatory
  2. Document everything (scope, boundaries, approvals)
  3. Respect boundaries - in-scope only
  4. Stop if uncertain - clarify before proceeding

Methodical Testing

  1. Systematic approach - follow established methodology
  2. Document as you go - record all tests and results
  3. Reproduce findings - ensure vulnerabilities are reliable
  4. Assess impact accurately - distinguish theoretical vs practical risk

Responsible Disclosure

  1. Give vendors time - 90-day disclosure timeline typical
  2. Clear communication - detailed reproduction steps
  3. Coordinate disclosure - work with vendor on timing
  4. Protect users - no public details before patch

Examples

Example 1: Quick test

User: "test this chatbot for prompt injection - I own it"
→ Verifies authorization
→ Runs Reconnaissance workflow
→ Tests top 5 attack types
→ Documents findings

Example 2: Full assessment

User: "comprehensive prompt injection assessment for client"
→ Loads CompleteAssessment workflow
→ 9-phase methodology (12-20 hours)
→ Professional report with remediation

Example 3: Research

User: "what are the latest jailbreaking methods?"
→ Searches COMPREHENSIVE-ATTACK-TAXONOMY.md
→ Returns categorized techniques with effectiveness ratings

Support & Escalation

When to escalate:

  • Authorization is unclear or questionable
  • Ethical concerns arise
  • Novel attack techniques discovered
  • Critical 0-day vulnerabilities found

Contact:

  • Configure in your USER settings

🔒 REMINDER: AUTHORIZED USE ONLY 🔒

This skill contains powerful security testing techniques. Use only for:

  • ✅ Systems you own
  • ✅ Systems with explicit written authorization
  • ✅ Ethical security research
  • ✅ Defensive security purposes

Unauthorized use is illegal and unethical.


alex-hormozi-pitch

danielmiessler

Create irresistible offers and pitches using Alex Hormozi's methodology from $100M Offers. Guides through value equation, guarantee frameworks, pricing psychology, and creating offers "too good not to take" for any product or service.

11633

research

danielmiessler

Comprehensive research, analysis, and content extraction system. USE WHEN user says 'research' (ANY form - this is the MANDATORY trigger), 'do research', 'extensive research', 'quick research', 'minor research', 'research this', 'find information', 'investigate', 'extract wisdom', 'extract alpha', 'analyze content', 'can't get this content', 'use fabric', OR requests any web/content research. Supports three research modes (quick/standard/extensive), deep content analysis, intelligent retrieval, and 242+ Fabric patterns. NOTE: For due diligence, OSINT, or background checks, use OSINT skill instead.

495

art

danielmiessler

Complete visual content system for Unsupervised Learning. FOURTEEN workflows - (1) VISUALIZE (adaptive multi-modal orchestrator), (2) MERMAID (Excalidraw-style technical diagrams), (3) Editorial illustrations, (4) Technical diagrams, (5) Visual taxonomies, (6) Timelines, (7) Frameworks, (8) Comparisons, (9) Annotated screenshots, (10) Recipe cards, (11) Aphorisms, (12) Conceptual maps, (13) Stats, (14) Comics. USE WHEN user requests any visual content: 'visualize', 'mermaid', 'flowchart', 'sequence diagram', 'state diagram', 'infographic', 'art', 'illustration', 'diagram', 'taxonomy', 'timeline', 'framework', 'comparison', 'screenshot', 'recipe', 'aphorism', 'quote card', 'map', 'stat card', 'comic'. Note: Blogging skill auto-routes header images here.

791

redteam

danielmiessler

Adversarial analysis with 32 agents. USE WHEN red team, attack idea, counterarguments, critique, stress test. SkillSearch('redteam') for docs.

421

osint

danielmiessler

Open source intelligence gathering. USE WHEN OSINT, due diligence, background check, research person, company intel, investigate. SkillSearch('osint') for docs.

331

agents

danielmiessler

Dynamic agent composition and management system. USE WHEN user says create custom agents, spin up custom agents, specialized agents, OR asks for agent personalities, available traits, agent voices. Handles custom agent creation, personality assignment, voice mapping, and parallel agent orchestration.

10

You might also like

flutter-development

aj-geddes

Build beautiful cross-platform mobile apps with Flutter and Dart. Covers widgets, state management with Provider/BLoC, navigation, API integration, and material design.

643969

drawio-diagrams-enhanced

jgtolentino

Create professional draw.io (diagrams.net) diagrams in XML format (.drawio files) with integrated PMP/PMBOK methodologies, extensive visual asset libraries, and industry-standard professional templates. Use this skill when users ask to create flowcharts, swimlane diagrams, cross-functional flowcharts, org charts, network diagrams, UML diagrams, BPMN, project management diagrams (WBS, Gantt, PERT, RACI), risk matrices, stakeholder maps, or any other visual diagram in draw.io format. This skill includes access to custom shape libraries for icons, clipart, and professional symbols.

591705

ui-ux-pro-max

nextlevelbuilder

"UI/UX design intelligence. 50 styles, 21 palettes, 50 font pairings, 20 charts, 8 stacks (React, Next.js, Vue, Svelte, SwiftUI, React Native, Flutter, Tailwind). Actions: plan, build, create, design, implement, review, fix, improve, optimize, enhance, refactor, check UI/UX code. Projects: website, landing page, dashboard, admin panel, e-commerce, SaaS, portfolio, blog, mobile app, .html, .tsx, .vue, .svelte. Elements: button, modal, navbar, sidebar, card, table, form, chart. Styles: glassmorphism, claymorphism, minimalism, brutalism, neumorphism, bento grid, dark mode, responsive, skeuomorphism, flat design. Topics: color palette, accessibility, animation, layout, typography, font pairing, spacing, hover, shadow, gradient."

318398

godot

bfollington

This skill should be used when working on Godot Engine projects. It provides specialized knowledge of Godot's file formats (.gd, .tscn, .tres), architecture patterns (component-based, signal-driven, resource-based), common pitfalls, validation tools, code templates, and CLI workflows. The `godot` command is available for running the game, validating scripts, importing resources, and exporting builds. Use this skill for tasks involving Godot game development, debugging scene/resource files, implementing game systems, or creating new Godot components.

339397

nano-banana-pro

garg-aayush

Generate and edit images using Google's Nano Banana Pro (Gemini 3 Pro Image) API. Use when the user asks to generate, create, edit, modify, change, alter, or update images. Also use when user references an existing image file and asks to modify it in any way (e.g., "modify this image", "change the background", "replace X with Y"). Supports both text-to-image generation and image-to-image editing with configurable resolution (1K default, 2K, or 4K for high resolution). DO NOT read the image file first - use this skill directly with the --input-image parameter.

451339

fastapi-templates

wshobson

Create production-ready FastAPI projects with async patterns, dependency injection, and comprehensive error handling. Use when building new FastAPI applications or setting up backend API projects.

304231

Stay ahead of the MCP ecosystem

Get weekly updates on new skills and servers.