Threat research & playbooks

The Context Guard blog

Field notes from defending production LLM applications - prompt injection, context poisoning, OWASP LLM Top 10 coverage, and the engineering behind the proxy.

Try Context Guard
CI/CD Pipeline Injection: When Your Build Bot Has an LLM InsideFeatured · Threat research
13 May 2026 13 min read

CI/CD Pipeline Injection: When Your Build Bot Has an LLM Inside

LLM-powered CI/CD workflows are a new attack surface that traditional pipeline security cannot defend. The Heimdallr research, CVE-2025-65106, and real-world attack patterns show how PR descriptions, commit messages, and template injection can compromise your build pipeline from the inside.

Read article

All posts

RAG Data Exfiltration: How Attackers Steal Your Knowledge Base
Threat research

RAG Data Exfiltration: How Attackers Steal Your Knowledge Base

RAG systems give LLMs access to proprietary data. Attackers have figured out how to pull it all out through the model itself. Here is how the LeakDojo attack works, how enumeration probes map your knowledge base, and how to lock it down.

13 May 2026 12 min
Securing Autonomous AI Agents: Attack Surfaces, Threats, and Defense Patterns
Threat research

Securing Autonomous AI Agents: Attack Surfaces, Threats, and Defense Patterns

Autonomous AI agents can browse the web, call APIs, and send emails on your behalf. Here are the seven attack classes we see in production and the six-layer defense architecture that stops them.

12 May 2026 14 min
Why We Built a Hybrid Detection Engine
Engineering

Why We Built a Hybrid Detection Engine

Per-dataset benchmark results for the Context Guard hybrid pipeline (rules plus ML judge), where each layer wins, the AdvBench ceiling, and why we run both.

11 May 2026 8 min
MCP Security Attacks: How Attackers Hijack AI Tool Calls in 2026
Threat research

MCP Security Attacks: How Attackers Hijack AI Tool Calls in 2026

Three CVEs, multiple GitHub advisories, and growing academic research expose MCP tool hijacking, SSE injection, LoopTrap, and agentic browser attacks. Here is the full threat map and how to defend against it.

10 May 2026 14 min
AI Security Best Practices for Production LLM Applications
Guide

AI Security Best Practices for Production LLM Applications

An end-to-end practical guide to shipping production LLM applications safely: input validation, output filtering, agent controls, monitoring, and compliance.

8 May 2026 13 min
OWASP LLM Top 10 2025: Every Risk Explained with Mitigations
Reference

OWASP LLM Top 10 2025: Every Risk Explained with Mitigations

Walk through every item in the OWASP LLM Top 10 with practical mitigations and a coverage map for runtime defense layers.

4 May 2026 11 min
10 Real Prompt Injection Attacks & How to Stop Them
Tutorial

10 Real Prompt Injection Attacks & How to Stop Them

A practical tour of ten prompt injection techniques observed in production traffic, with payloads and the detection logic that stops each one.

30 April 2026 12 min
What Is Context Poisoning? The Complete Guide for 2026
Threat research

What Is Context Poisoning? The Complete Guide for 2026

Context poisoning is the next-generation cousin of prompt injection. Learn what it is, how it differs, real-world attack scenarios, and how to defend against it.

22 April 2026 10 min