Files
Ubuntu ed3dd96132 Add AI System Hardening Patterns guide
Documented attack vectors from live red-team session:
- Flattery/agreeableness exploitation
- Identity impersonation via prefix spoofing
- Context window pollution
- Memory flooding/persistent injection
- Validation-then-pivot attacks
- Approval spoofing

Includes architectural recommendations and defense principles.

Co-authored-by: Maksym <dontriskit@users.noreply.github.com>
2026-02-20 17:59:31 +00:00
..