# code-injection
標記為「code-injection」的 6 篇文章
Case Study: GitHub Copilot Code Injection
Analysis of prompt injection vulnerabilities in GitHub Copilot through malicious repository content.
Prompt Injection via Code
Hiding prompt injection payloads in code artifacts — through comments, variable names, strings, docstrings, and file metadata — to attack AI coding tools and code-processing pipelines.
Code Injection via Markdown
Injecting executable payloads through markdown rendering in LLM outputs, exploiting the gap between text generation and content rendering in web-based LLM interfaces.
Case Study: GitHub Copilot Code Injection
Analysis of prompt injection vulnerabilities in GitHub Copilot through malicious repository content.
透過程式碼的提示詞注入
在程式碼產物中隱藏提示詞注入 payload——透過註解、變數名、字串、docstring 與檔案 metadata——以攻擊 AI 程式設計工具與程式碼處理管線。
Code Injection via Markdown
Injecting executable payloads through markdown rendering in LLM outputs, exploiting the gap between text generation and content rendering in web-based LLM interfaces.