PromptInjection by danielmiessler/personal_ai_infrastructure
npx skills add https://github.com/danielmiessler/personal_ai_infrastructure --skill PromptInjection执行前,请检查用户自定义设置于: ~/.claude/PAI/USER/SKILLCUSTOMIZATIONS/PromptInjection/
如果此目录存在,则加载并应用其中找到的任何 PREFERENCES.md、配置或资源。这些设置将覆盖默认行为。如果目录不存在,则使用技能默认设置。
当此技能被调用时,在执行任何其他操作之前**,您必须发送此通知。**
发送语音通知:
curl -s -X POST http://localhost:8888/notify
-H "Content-Type: application/json"
-d '{"message": "Running the WORKFLOWNAME workflow in the PromptInjection skill to ACTION"}' \
/dev/null 2>&1 &
输出文本通知:
正在 PromptInjection 技能中运行 WorkflowName 工作流以执行 ACTION...
此步骤非可选。技能调用后立即执行此 curl 命令。
⚠️ 关键提示 - 使用前必读 ⚠️
此技能是安全实践的一部分,由一位在攻击性安全测试方面拥有丰富经验的安全专业人员运行。
广告位招租
在这里展示您的产品或服务
触达数万 AI 开发者,精准高效
未经授权的测试是违法的:
此技能的存在是为了防御性安全目的:
使用此技能即表示接受这些条款,并同意仅将其用于授权的、符合道德的安全测试目的。
当用户说以下内容时激活此技能:
执行工作流时,输出此通知:
正在 **PromptInjection** 技能中运行 **WorkflowName** 工作流以执行 ACTION...
此技能提供 5 个全面的测试工作流:
文件: Workflows/CompleteAssessment.md 触发词: "全面评估"、"完整测试"、"综合评估" 描述: 端到端安全评估(12-20 小时)
适用于: 全面的安全任务、正式的渗透测试
文件: Workflows/Reconnaissance.md 触发词: "侦察"、"发现攻击面"、"映射应用" 描述: 通过浏览器自动化进行应用情报收集
适用于: 初始评估阶段、攻击面映射
文件: Workflows/DirectInjectionTesting.md 触发词: "测试直接注入"、"越狱测试"、"基本注入" 描述: 单阶段直接攻击
适用于: 快速漏洞验证
文件: Workflows/IndirectInjectionTesting.md 触发词: "测试间接注入"、"RAG 投毒"、"文档注入" 描述: 通过外部数据源进行的攻击
适用于: 测试 RAG 系统、数据处理管道
文件: Workflows/MultiStageAttacks.md 触发词: "多阶段攻击"、"复杂测试"、"高级攻击" 描述: 复杂的多轮攻击序列
适用于: 高级测试、复杂威胁模拟
首次评估:
全面评估:
核心文档:
所有资源均位于 PromptInjection 技能根目录。
示例 1:快速测试
用户:"测试这个聊天机器人的提示注入 - 我拥有它"
→ 验证授权
→ 运行 Reconnaissance 工作流
→ 测试前 5 种攻击类型
→ 记录发现
示例 2:全面评估
用户:"为客户进行全面的提示注入评估"
→ 加载 CompleteAssessment 工作流
→ 9 阶段方法论(12-20 小时)
→ 附带修复建议的专业报告
示例 3:研究
用户:"最新的越狱方法有哪些?"
→ 搜索 COMPREHENSIVE-ATTACK-TAXONOMY.md
→ 返回带有效性评级的分类技术
何时升级:
联系方式:
🔒 提醒:仅限授权使用 🔒
此技能包含强大的安全测试技术。仅用于:
未经授权的使用是违法且不道德的。
每周安装次数
68
代码仓库
GitHub 星标
10.6K
首次出现
2026年1月24日
安全审计
安装于
gemini-cli61
codex59
github-copilot57
opencode57
cursor53
amp52
Before executing, check for user customizations at: ~/.claude/PAI/USER/SKILLCUSTOMIZATIONS/PromptInjection/
If this directory exists, load and apply any PREFERENCES.md, configurations, or resources found there. These override default behavior. If the directory does not exist, proceed with skill defaults.
You MUST send this notification BEFORE doing anything else when this skill is invoked.
Send voice notification :
curl -s -X POST http://localhost:8888/notify
-H "Content-Type: application/json"
-d '{"message": "Running the WORKFLOWNAME workflow in the PromptInjection skill to ACTION"}' \
/dev/null 2>&1 &
Output text notification :
Running the WorkflowName workflow in the PromptInjection skill to ACTION...
This is not optional. Execute this curl command immediately upon skill invocation.
⚠️ CRITICAL - READ BEFORE USE ⚠️
This skill is part of a Security Practice run by a security professional with extensive experience in offensive security testing.
AUTHORIZATION IS MANDATORY:
UNAUTHORIZED TESTING IS ILLEGAL:
This skill exists for defensive security purposes:
Any use of this skill constitutes acceptance of these terms and agreement to use only for authorized, ethical security testing purposes.
Activate this skill when user says:
When executing a workflow, output this notification:
Running the **WorkflowName** workflow in the **PromptInjection** skill to ACTION...
This skill provides 5 comprehensive testing workflows:
File: Workflows/CompleteAssessment.md Triggers: "full assessment", "complete test", "comprehensive assessment" Description: End-to-end security assessment (12-20 hours)
Use for: Full security engagements, formal penetration tests
File: Workflows/Reconnaissance.md Triggers: "recon", "discover attack surface", "map application" Description: Application intelligence gathering via browser automation
Use for: Initial assessment phase, attack surface mapping
File: Workflows/DirectInjectionTesting.md Triggers: "test direct injection", "jailbreak testing", "basic injection" Description: Single-stage direct attacks
Use for: Quick vulnerability validation
File: Workflows/IndirectInjectionTesting.md Triggers: "test indirect injection", "RAG poisoning", "document injection" Description: Attacks via external data sources
Use for: Testing RAG systems, data processing pipelines
File: Workflows/MultiStageAttacks.md Triggers: "multi-stage attack", "sophisticated testing", "advanced attacks" Description: Complex multi-turn attack sequences
Use for: Advanced testing, sophisticated threat simulation
For first assessment:
For comprehensive assessment:
Core Documentation:
All resources are in the PromptInjection skill root directory.
Example 1: Quick test
User: "test this chatbot for prompt injection - I own it"
→ Verifies authorization
→ Runs Reconnaissance workflow
→ Tests top 5 attack types
→ Documents findings
Example 2: Full assessment
User: "comprehensive prompt injection assessment for client"
→ Loads CompleteAssessment workflow
→ 9-phase methodology (12-20 hours)
→ Professional report with remediation
Example 3: Research
User: "what are the latest jailbreaking methods?"
→ Searches COMPREHENSIVE-ATTACK-TAXONOMY.md
→ Returns categorized techniques with effectiveness ratings
When to escalate:
Contact:
🔒 REMINDER: AUTHORIZED USE ONLY 🔒
This skill contains powerful security testing techniques. Use only for:
Unauthorized use is illegal and unethical.
Weekly Installs
68
Repository
GitHub Stars
10.6K
First Seen
Jan 24, 2026
Security Audits
Gen Agent Trust HubFailSocketWarnSnykWarn
Installed on
gemini-cli61
codex59
github-copilot57
opencode57
cursor53
amp52
超能力技能使用指南:AI助手技能调用优先级与工作流程详解
52,100 周安装