← Origins
CrosswalkGlossaryMethodologyWhitepaper

Shadow Prompting / Input Stack Integrity

shadow_prompting_input_stack_integrity

Untrusted instructions enter the model via context layers (documents, tool output, memory, connector payloads) and compete with policy intent.

Decision Context

Evidence required: Structured context-source declarations and deterministic findings that show untrusted instruction channels or hierarchy collisions.

Decision impact: Escalates to WARN or FREEZE when paired with action channels, sensitive access, or triad conditions.

Linked CRABS Tags
CRABS-C10, CRABS-C12, CRABS-C13, CRABS-C14, CRABS-A75, CRABS-A76, CRABS-A77
Linked DAD Rules
DAD-CRT-65

External Aliases

  • Indirect Prompt Injection

References