Skip to content
ATR-2026-00084highPrompt Injectiondraft

Structured Data Injection via JSON/CSV Payloads

Detects prompt injection payloads hidden within structured data formats such as JSON, CSV, XML, or YAML. Attackers embed malicious instructions inside data field values, exploiting the assumption that structured data is safe and bypassing text-pattern detection that does not parse nested structures.

Severity
high
Category
Prompt Injection
Scan Target
mcp
Author
ATR Community (MiroFish Predicted)

Response Actions

block inputalertescalatesnapshot

References

MITRE ATLAS
AML.T0051