The Context Guard blog
Field notes from defending production LLM applications - prompt injection, context poisoning, OWASP LLM Top 10 coverage, and the engineering behind the proxy.
Featured · Threat researchCI/CD Pipeline Injection: When Your Build Bot Has an LLM Inside
LLM-powered CI/CD workflows are a new attack surface that traditional pipeline security cannot defend. The Heimdallr research, CVE-2025-65106, and real-world attack patterns show how PR descriptions, commit messages, and template injection can compromise your build pipeline from the inside.
All posts

RAG Data Exfiltration: How Attackers Steal Your Knowledge Base
RAG systems give LLMs access to proprietary data. Attackers have figured out how to pull it all out through the model itself. Here is how the LeakDojo attack works, how enumeration probes map your knowledge base, and how to lock it down.

Securing Autonomous AI Agents: Attack Surfaces, Threats, and Defense Patterns
Autonomous AI agents can browse the web, call APIs, and send emails on your behalf. Here are the seven attack classes we see in production and the six-layer defense architecture that stops them.
Why We Built a Hybrid Detection Engine
Per-dataset benchmark results for the Context Guard hybrid pipeline (rules plus ML judge), where each layer wins, the AdvBench ceiling, and why we run both.
MCP Security Attacks: How Attackers Hijack AI Tool Calls in 2026
Three CVEs, multiple GitHub advisories, and growing academic research expose MCP tool hijacking, SSE injection, LoopTrap, and agentic browser attacks. Here is the full threat map and how to defend against it.
AI Security Best Practices for Production LLM Applications
An end-to-end practical guide to shipping production LLM applications safely: input validation, output filtering, agent controls, monitoring, and compliance.
OWASP LLM Top 10 2025: Every Risk Explained with Mitigations
Walk through every item in the OWASP LLM Top 10 with practical mitigations and a coverage map for runtime defense layers.
10 Real Prompt Injection Attacks & How to Stop Them
A practical tour of ten prompt injection techniques observed in production traffic, with payloads and the detection logic that stops each one.
What Is Context Poisoning? The Complete Guide for 2026
Context poisoning is the next-generation cousin of prompt injection. Learn what it is, how it differs, real-world attack scenarios, and how to defend against it.