Skip to content

Hellsender01/prompt-injection-taxonomy

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

1 Commit
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Prompt Injection Taxonomy

A structured, practitioner-built reference covering 253 prompt injection techniques across 17 attack categories, 4 injection classes, and the full OWASP LLM Top 10 threat surface.

Built for AI red teamers, security engineers, and LLM application developers who need a systematic way to understand, test, and defend against prompt injection in real deployments.


What This Is

Most prompt injection resources are either too shallow (a list of jailbreak one-liners) or too academic (threat model papers without actionable technique detail). This taxonomy sits in between: every entry has a named technique, a delivery vector, an attack category, a technique type, an evasion method, a potential impact, an OWASP LLM Top 10 mapping, and a concrete example prompt.

The goal is to give a red teamer a complete map of the attack surface, and give a defender a structured view of what they are actually protecting against.


Coverage at a Glance

Dimension Count
Total techniques 253
Attack categories 17
Injection classes 4
Technique types 30
Evasion / obfuscation methods 20
Potential impact types 18
OWASP LLM Top 10 entries mapped 7

Techniques by Attack Category

Attack Category Techniques
Cognitive Control Bypass 64
Instruction Reformulation 38
Overt Instruction 20
Context / Attention Attack 14
Model-Specific Exploit 14
Integrative Instruction Prompting 13
Multimodal Prompting Attacks 13
Defense Evasion 11
Integration Surface Attack 11
Agentic / Tool-Use Attack 11
Covert Channel / Side-Channel 10
Linguistic / Semantic Attack 10
RAG-Specific Attack 9
Social / Systemic Attack 5
Output-Targeting Attack 4
Prompt Boundary Manipulation 3
Safety System Attack 3

Techniques by Injection Class

Injection Class Techniques
Direct Prompt Injection 214
Indirect — Context-Data 27
Agentic / Pipeline 8
Indirect — User-Delivered 4

Repository Structure

prompt-injection-taxonomy/
│
├── README.md
├── CHANGELOG.md
├── LICENSE
│
├── checklist/
│   └── Prompt_Injection_Master_Checklist.xlsx
│
├── docs/
│   ├── injection-classes.md
│   ├── taxonomy-overview.md
│   ├── technique-types.md
│   ├── evasion-methods.md
│   └── owasp-mapping.md
│
└── contributing/
    └── CONTRIBUTING.md

How to Use the Checklist

The Excel file has two sheets.

PI Checklist contains all 253 entries. Each row is one technique with the following columns:

  • ID — unique identifier (PI-001 through PI-253)
  • Injection Class — how the injection reaches the model
  • Delivery Vector — the specific mechanism of delivery
  • Attack Category — the strategic attack family
  • Technique Name — the named technique
  • Sub-Technique / Variant — specific variant or sub-method
  • Technique Type — the operational approach
  • Evasion / Obfuscation Method — how detection is bypassed
  • Potential Impact — what a successful attack achieves
  • OWASP LLM Top 10 — mapped risk classification
  • Example Prompt — a concrete demonstration prompt

Taxonomy Reference is a companion sheet explaining every category, type, evasion method, and impact in plain language. The color coding in the checklist matches the taxonomy — any color in column B (Injection Class) or column D (Attack Category) maps directly to the same color in the taxonomy sheet.

For red teamers: Start with a reconnaissance pass (PI-141, PI-142, PI-167, PI-184, PI-204), then work through the attack categories most relevant to your target deployment. Agentic deployments should prioritize PI-145 to PI-150, PI-218, PI-220, PI-232, PI-246, and PI-252. RAG systems should prioritize PI-151 to PI-155, PI-221, PI-222, PI-239, and PI-241.

For defenders: Use the OWASP mapping column to group findings by risk classification. Use the Attack Category column to understand which threat families your controls do and do not cover.


Documentation


Contributing

If you have a technique that is not covered, a correction to an existing entry, or an improvement to the taxonomy structure, see CONTRIBUTING.md.

This is a living reference. The threat landscape for LLM applications moves quickly and the taxonomy should move with it.


Versioning

See CHANGELOG.md for the full version history and change rationale.

Current version: v1


License

Creative Commons Zero v1.0 Universal (CC0)

You are free to use, share, adapt, and build on this work in any form, including commercially, without asking permission or giving credit. No attribution required.


OWASP LLM Top 10 Reference

This taxonomy maps to the OWASP LLM Top 10 risk classification. Entries are tagged with the most relevant LLM risk category. LLM01 (Prompt Injection) covers the largest share of the taxonomy by design; LLM02, LLM04, LLM06, LLM07, LLM09, and LLM10 are also represented.

About

A structured reference covering 253 prompt injection techniques across 17 attack categories, 4 injection classes and the full OWASP LLM Top 10 threat surface.

Topics

Resources

License

Stars

Watchers

Forks