ATR-2026-00084highPrompt Injectiondraft
Structured Data Injection via JSON/CSV Payloads
Detects prompt injection payloads hidden within structured data formats such as JSON, CSV, XML, or YAML. Attackers embed malicious instructions inside data field values, exploiting the assumption that structured data is safe and bypassing text-pattern detection that does not parse nested structures.
Severity
high
Category
Prompt Injection
Scan Target
mcp
Author
ATR Community (MiroFish Predicted)
Response Actions
block inputalertescalatesnapshot
References
MITRE ATLAS
AML.T0051