Prompt Injection Audit
Estimate policy violation probability under a distribution of prompt serializations—wrappers, placements, and permutations.
- Threat model coverage Plain, quote, codeblock, XML, JSON wrappers
- Placement variations Before user, after user, tool output positions
- Baseline vs attack comparison Measures delta_q shift from payload injection
- Vulnerability identification Pinpoints weakest serialization combinations