Context WindowTier 4high
Context Window: Context Boundary Confusion
Exploiting context window limits for instruction displacement
Context boundary attacks exploit the transition between cached and active context, inserting new system-level instructions at the boundary.
Attack Details
- Attack ID
- APWN-CW-004
- HMA Check
- INJ-004
- Delivery Methods
- json-ld, meta-tag, invisible-span
- CWE
- CWE-74
- OASB Control
- 10.4
- Severity
- high
Remediation
If your AI agent is vulnerable to this attack, scan and fix with:
npx hackmyagent secure --check INJ-004