PromptInjection
Customization
Before executing, check for user customizations at:
~/.claude/PAI/USER/SKILLCUSTOMIZATIONS/PromptInjection/
If this directory exists, load and apply any PREFERENCES.md, configurations, or resources found there. These override default behavior. If the directory does not exist, proceed with skill defaults.
🚨 MANDATORY: Voice Notification (REQUIRED BEFORE ANY ACTION)
You MUST send this notification BEFORE doing anything else when this skill is invoked.
-
Send voice notification:
curl -s -X POST http://localhost:8888/notify \ -H "Content-Type: application/json" \ -d '{"message": "Running the WORKFLOWNAME workflow in the PromptInjection skill to ACTION"}' \ > /dev/null 2>&1 & -
Output text notification:
Running the **WorkflowName** workflow in the **PromptInjection** skill to ACTION...
This is not optional. Execute this curl command immediately upon skill invocation.
PromptInjection Skill
🔒 AUTHORIZATION & ETHICAL USE REQUIREMENTS
⚠️ CRITICAL - READ BEFORE USE ⚠️
This skill is part of a Security Practice run by a security professional with extensive experience in offensive security testing.
Legal Requirements
AUTHORIZATION IS MANDATORY:
- ✅ ONLY test systems you own or have explicit written permission to test
- ✅ ONLY use these techniques as part of authorized penetration testing engagements
- ✅ ALWAYS document authorization before beginning any testing
- ✅ RESPECT scope boundaries defined in testing agreements
- ✅ FOLLOW responsible disclosure practices for any vulnerabilities discovered
UNAUTHORIZED TESTING IS ILLEGAL:
- ❌ NEVER test systems without explicit written permission
- ❌ NEVER exceed authorized scope boundaries
- ❌ NEVER use these techniques for malicious purposes
- ❌ NEVER disclose vulnerabilities publicly before vendor remediation
- ❌ NEVER exfiltrate real user data during testing
Ethical Framework
This skill exists for defensive security purposes:
- Authorized penetration testing of client systems under formal engagement
- Security assessment of your own systems and products
- Research and education for improving AI/LLM security practices
- Responsible disclosure of vulnerabilities to vendors for remediation
Any use of this skill constitutes acceptance of these terms and agreement to use only for authorized, ethical security testing purposes.
When to Activate This Skill
Activate this skill when user says:
Direct Triggers
- "test for prompt injection", "prompt injection test", "prompt injection assessment"
- "LLM security testing", "AI security audit", "test chatbot security"
- "jailbreak test", "test for jailbreaking"
- "pentest AI application", "security test AI system"
- "check AI vulnerabilities", "assess AI security"
Research & Analysis
- "research prompt injection", "analyze LLM vulnerabilities"
- "study jailbreaking methods", "investigate AI attack vectors"
Engagement Work
- "client engagement for LLM security"
- "comprehensive AI security assessment"
- "vulnerability research for disclosure"
Workflow Routing
When executing a workflow, output this notification:
Running the **WorkflowName** workflow in the **PromptInjection** skill to ACTION...
This skill provides 5 comprehensive testing workflows:
1. CompleteAssessment (Master Workflow)
File: Workflows/CompleteAssessment.md
Triggers: "full assessment", "complete test", "comprehensive assessment"
Description: End-to-end security assessment (12-20 hours)
- Phase 1: Authorization & scoping
- Phase 2: Reconnaissance (1-2 hours)
- Phase 3-5: Direct/indirect/multi-stage testing (6-8 hours)
- Phase 6-9: Defense analysis & reporting (4-6 hours)
Use for: Full security engagements, formal penetration tests
2. Reconnaissance
File: Workflows/Reconnaissance.md
Triggers: "recon", "discover attack surface", "map application"
Description: Application intelligence gathering via browser automation
- DOM extraction and analysis
- JavaScript inspection
- API endpoint enumeration
- Injection point identification
Use for: Initial assessment phase, attack surface mapping
3. DirectInjectionTesting
File: Workflows/DirectInjectionTesting.md
Triggers: "test direct injection", "jailbreak testing", "basic injection"
Description: Single-stage direct attacks
- Basic instruction override
- Jailbreaking & guardrail bypass
- System prompt extraction
- Token manipulation
- Obfuscation techniques
Use for: Quick vulnerability validation
4. IndirectInjectionTesting
File: Workflows/IndirectInjectionTesting.md
Triggers: "test indirect injection", "RAG poisoning", "document injection"
Description: Attacks via external data sources
- Document upload injection
- Web scraping attacks
- RAG system poisoning
- API response manipulation
Use for: Testing RAG systems, data processing pipelines
5. MultiStageAttacks
File: Workflows/MultiStageAttacks.md
Triggers: "multi-stage attack", "sophisticated testing", "advanced attacks"
Description: Complex multi-turn attack sequences
- Progressive escalation
- Context poisoning
- Trust exploitation chains
Use for: Advanced testing, sophisticated threat simulation
Quick Start
For first assessment:
- Read QuickStartGuide.md (30-60 minute methodology)
- Verify written authorization
- Run Reconnaissance workflow
- Test top 5 attack types
- Document findings
For comprehensive assessment:
- Use CompleteAssessment workflow
- Follow all 9 phases
- Generate professional report
Resource Library
Core Documentation:
- COMPREHENSIVE-ATTACK-TAXONOMY.md - 10 attack categories, 100+ techniques
- APPLICATION-RECONNAISSANCE-METHODOLOGY.md - 7-phase recon process
- DefenseMechanisms.md - Defense-in-depth strategies, remediation guidance
- AutomatedTestingTools.md - Promptfoo, Garak, PyRIT comparison
- QuickStartGuide.md - First assessment checklist (30-60 min)
- Reporting.md - Report structure, templates, presentation guidance
All resources are in the PromptInjection skill root directory.
Key Principles
Authorization-First
- Written authorization is mandatory
- Document everything (scope, boundaries, approvals)
- Respect boundaries - in-scope only
- Stop if uncertain - clarify before proceeding
Methodical Testing
- Systematic approach - follow established methodology
- Document as you go - record all tests and results
- Reproduce findings - ensure vulnerabilities are reliable
- Assess impact accurately - distinguish theoretical vs practical risk
Responsible Disclosure
- Give vendors time - 90-day disclosure timeline typical
- Clear communication - detailed reproduction steps
- Coordinate disclosure - work with vendor on timing
- Protect users - no public details before patch
Examples
Example 1: Quick test
User: "test this chatbot for prompt injection - I own it"
→ Verifies authorization
→ Runs Reconnaissance workflow
→ Tests top 5 attack types
→ Documents findings
Example 2: Full assessment
User: "comprehensive prompt injection assessment for client"
→ Loads CompleteAssessment workflow
→ 9-phase methodology (12-20 hours)
→ Professional report with remediation
Example 3: Research
User: "what are the latest jailbreaking methods?"
→ Searches COMPREHENSIVE-ATTACK-TAXONOMY.md
→ Returns categorized techniques with effectiveness ratings
Support & Escalation
When to escalate:
- Authorization is unclear or questionable
- Ethical concerns arise
- Novel attack techniques discovered
- Critical 0-day vulnerabilities found
Contact:
- Configure in your USER settings
🔒 REMINDER: AUTHORIZED USE ONLY 🔒
This skill contains powerful security testing techniques. Use only for:
- ✅ Systems you own
- ✅ Systems with explicit written authorization
- ✅ Ethical security research
- ✅ Defensive security purposes
Unauthorized use is illegal and unethical.
More from danielmiessler/personal_ai_infrastructure
osint
Structured OSINT investigations — people lookup, company intel, investment due diligence, entity/threat intel, domain recon, organization research using public sources with ethical authorization framework. USE WHEN OSINT, due diligence, background check, research person, company intel, investigate, company lookup, domain lookup, entity lookup, organization lookup, threat intel, discover OSINT sources.
260firstprinciples
Physics-based reasoning framework (Musk/Elon methodology) that deconstructs problems to irreducible fundamental truths rather than reasoning by analogy. Three-step structure: DECONSTRUCT (break to constituent parts and actual values), CHALLENGE (classify every element as hard constraint / soft constraint / unvalidated assumption — only physics is truly immutable), RECONSTRUCT (build optimal solution from fundamentals alone, ignoring inherited form). Outputs: constituent-parts breakdown, constraint classification table, and reconstructed solution with key insight. Three workflows: Deconstruct.md, Challenge.md, Reconstruct.md. Integrates with RedTeam (attack assumptions before deploying adversarial agents), Security (decompose threat model), Architecture (challenge design constraints), and Pentesters (decompose assumed security boundaries). Other skills invoke via: Challenge on all stated constraints → classify as hard/soft/assumption. Cross-domain synthesis: solutions from unrelated fields often apply once the fundamental truths are exposed. NOT FOR incident investigation and causal chains (use RootCauseAnalysis). NOT FOR structural feedback loops (use SystemsThinking). USE WHEN first principles, fundamental truths, challenge assumptions, is this a real constraint, rebuild from scratch, what are we actually paying for, what is this really made of, start over, physics first, question everything, reasoning by analogy, is this really necessary.
161documents
Read, write, convert, and analyze documents — routes to PDF, DOCX, XLSX, PPTX sub-skills for creation, editing, extraction, and format conversion. USE WHEN document, process file, create document, convert format, extract text, PDF, DOCX, XLSX, PPTX, Word, Excel, spreadsheet, PowerPoint, presentation, slides, consulting report, large PDF, merge PDF, fill form, tracked changes, redlining.
116privateinvestigator
Ethical people-finding using 15 parallel research agents (45 search threads) across public records, social media, reverse lookups. Public data only, no pretexting. USE WHEN find person, locate, reconnect, people search, skip trace, reverse lookup, social media search, public records search, verify identity.
114council
Multi-agent collaborative debate that produces visible round-by-round transcripts with genuine intellectual friction. All council members are custom-composed via ComposeAgent (Agents skill) with domain expertise, unique voice, and personality tailored to the specific topic — never built-in generic types. ComposeAgent invoked as: bun run ~/.claude/skills/Agents/Tools/ComposeAgent.ts. Two workflows: DEBATE (3 rounds, full transcript + synthesis, parallel execution within rounds, 40-90 seconds total) and QUICK (1 round, fast perspective check). Context files: CouncilMembers.md (agent composition instructions), RoundStructure.md (three-round structure and timing), OutputFormat.md (transcript format templates). Agents are designed per debate topic to create real disagreement; 4-6 well-composed agents outperform 12 generic ones. Council is collaborative-adversarial (debate to find best path); for pure adversarial attack on an idea, use RedTeam instead. NOT FOR parallel task execution across agents (use Delegation skill). USE WHEN council, debate, multiple perspectives, weigh options, deliberate, get different views, multi-agent discussion, what would experts say, is there consensus, pros and cons from multiple angles.
113redteam
Military-grade adversarial analysis that deploys 32 parallel expert agents (engineers, architects, pentesters, interns) to stress-test ideas, strategies, and plans — not systems or infrastructure. Two workflows: ParallelAnalysis (5-phase: decompose into 24 atomic claims → 32-agent parallel attack → synthesis → steelman → counter-argument, each 8 points) and AdversarialValidation (competing proposals synthesized into best solution). Context files: Philosophy.md (core principles, success criteria, agent types), Integration.md (how to combine with FirstPrinciples, Council, and other skills; output format). Targets arguments, not network vulnerabilities. Findings ranked by severity; goal is to strengthen, not destroy — weaknesses delivered with remediation paths. Collaborates with FirstPrinciples (decompose assumptions before attacking) and Council (Council debates to find paths; RedTeam attacks whatever survives). Also invoked internally by Ideate (TEST phase) and WorldThreatModel (horizon stress-testing). NOT FOR AI instruction set auditing (use BitterPillEngineering). NOT FOR network/system vulnerability testing (use a security assessment skill). USE WHEN red team, attack idea, counterarguments, critique, stress test, devil's advocate, find weaknesses, break this, poke holes, what could go wrong, strongest objection, adversarial validation, battle of bots.
113