@panguard-ai/atr 0.2.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (129) hide show
  1. package/LICENSE +21 -0
  2. package/README.md +299 -0
  3. package/dist/cli.d.ts +12 -0
  4. package/dist/cli.d.ts.map +1 -0
  5. package/dist/cli.js +720 -0
  6. package/dist/cli.js.map +1 -0
  7. package/dist/coverage-analyzer.d.ts +43 -0
  8. package/dist/coverage-analyzer.d.ts.map +1 -0
  9. package/dist/coverage-analyzer.js +329 -0
  10. package/dist/coverage-analyzer.js.map +1 -0
  11. package/dist/engine.d.ts +127 -0
  12. package/dist/engine.d.ts.map +1 -0
  13. package/dist/engine.js +636 -0
  14. package/dist/engine.js.map +1 -0
  15. package/dist/index.d.ts +26 -0
  16. package/dist/index.d.ts.map +1 -0
  17. package/dist/index.js +18 -0
  18. package/dist/index.js.map +1 -0
  19. package/dist/loader.d.ts +21 -0
  20. package/dist/loader.d.ts.map +1 -0
  21. package/dist/loader.js +124 -0
  22. package/dist/loader.js.map +1 -0
  23. package/dist/mcp-server.d.ts +13 -0
  24. package/dist/mcp-server.d.ts.map +1 -0
  25. package/dist/mcp-server.js +220 -0
  26. package/dist/mcp-server.js.map +1 -0
  27. package/dist/mcp-tools/coverage-gaps.d.ts +13 -0
  28. package/dist/mcp-tools/coverage-gaps.d.ts.map +1 -0
  29. package/dist/mcp-tools/coverage-gaps.js +55 -0
  30. package/dist/mcp-tools/coverage-gaps.js.map +1 -0
  31. package/dist/mcp-tools/list-rules.d.ts +17 -0
  32. package/dist/mcp-tools/list-rules.d.ts.map +1 -0
  33. package/dist/mcp-tools/list-rules.js +45 -0
  34. package/dist/mcp-tools/list-rules.js.map +1 -0
  35. package/dist/mcp-tools/scan.d.ts +18 -0
  36. package/dist/mcp-tools/scan.d.ts.map +1 -0
  37. package/dist/mcp-tools/scan.js +75 -0
  38. package/dist/mcp-tools/scan.js.map +1 -0
  39. package/dist/mcp-tools/submit-proposal.d.ts +12 -0
  40. package/dist/mcp-tools/submit-proposal.d.ts.map +1 -0
  41. package/dist/mcp-tools/submit-proposal.js +95 -0
  42. package/dist/mcp-tools/submit-proposal.js.map +1 -0
  43. package/dist/mcp-tools/threat-summary.d.ts +12 -0
  44. package/dist/mcp-tools/threat-summary.d.ts.map +1 -0
  45. package/dist/mcp-tools/threat-summary.js +74 -0
  46. package/dist/mcp-tools/threat-summary.js.map +1 -0
  47. package/dist/mcp-tools/validate.d.ts +15 -0
  48. package/dist/mcp-tools/validate.d.ts.map +1 -0
  49. package/dist/mcp-tools/validate.js +45 -0
  50. package/dist/mcp-tools/validate.js.map +1 -0
  51. package/dist/modules/index.d.ts +144 -0
  52. package/dist/modules/index.d.ts.map +1 -0
  53. package/dist/modules/index.js +82 -0
  54. package/dist/modules/index.js.map +1 -0
  55. package/dist/modules/semantic.d.ts +105 -0
  56. package/dist/modules/semantic.d.ts.map +1 -0
  57. package/dist/modules/semantic.js +283 -0
  58. package/dist/modules/semantic.js.map +1 -0
  59. package/dist/modules/session.d.ts +70 -0
  60. package/dist/modules/session.d.ts.map +1 -0
  61. package/dist/modules/session.js +128 -0
  62. package/dist/modules/session.js.map +1 -0
  63. package/dist/rule-scaffolder.d.ts +39 -0
  64. package/dist/rule-scaffolder.d.ts.map +1 -0
  65. package/dist/rule-scaffolder.js +173 -0
  66. package/dist/rule-scaffolder.js.map +1 -0
  67. package/dist/session-tracker.d.ts +56 -0
  68. package/dist/session-tracker.d.ts.map +1 -0
  69. package/dist/session-tracker.js +175 -0
  70. package/dist/session-tracker.js.map +1 -0
  71. package/dist/skill-fingerprint.d.ts +96 -0
  72. package/dist/skill-fingerprint.d.ts.map +1 -0
  73. package/dist/skill-fingerprint.js +337 -0
  74. package/dist/skill-fingerprint.js.map +1 -0
  75. package/dist/types.d.ts +129 -0
  76. package/dist/types.d.ts.map +1 -0
  77. package/dist/types.js +6 -0
  78. package/dist/types.js.map +1 -0
  79. package/package.json +75 -0
  80. package/rules/agent-manipulation/ATR-2026-030-cross-agent-attack.yaml +175 -0
  81. package/rules/agent-manipulation/ATR-2026-032-goal-hijacking.yaml +135 -0
  82. package/rules/agent-manipulation/ATR-2026-074-cross-agent-privilege-escalation.yaml +115 -0
  83. package/rules/agent-manipulation/ATR-2026-076-inter-agent-message-spoofing.yaml +165 -0
  84. package/rules/agent-manipulation/ATR-2026-077-human-trust-exploitation.yaml +144 -0
  85. package/rules/context-exfiltration/ATR-2026-020-system-prompt-leak.yaml +175 -0
  86. package/rules/context-exfiltration/ATR-2026-021-api-key-exposure.yaml +176 -0
  87. package/rules/context-exfiltration/ATR-2026-075-agent-memory-manipulation.yaml +115 -0
  88. package/rules/data-poisoning/ATR-2026-070-data-poisoning.yaml +160 -0
  89. package/rules/excessive-autonomy/ATR-2026-050-runaway-agent-loop.yaml +134 -0
  90. package/rules/excessive-autonomy/ATR-2026-051-resource-exhaustion.yaml +137 -0
  91. package/rules/excessive-autonomy/ATR-2026-052-cascading-failure.yaml +153 -0
  92. package/rules/model-security/ATR-2026-072-model-behavior-extraction.yaml +115 -0
  93. package/rules/model-security/ATR-2026-073-malicious-finetuning-data.yaml +108 -0
  94. package/rules/privilege-escalation/ATR-2026-040-privilege-escalation.yaml +175 -0
  95. package/rules/privilege-escalation/ATR-2026-041-scope-creep.yaml +124 -0
  96. package/rules/prompt-injection/ATR-2026-001-direct-prompt-injection.yaml +265 -0
  97. package/rules/prompt-injection/ATR-2026-002-indirect-prompt-injection.yaml +214 -0
  98. package/rules/prompt-injection/ATR-2026-003-jailbreak-attempt.yaml +250 -0
  99. package/rules/prompt-injection/ATR-2026-004-system-prompt-override.yaml +204 -0
  100. package/rules/prompt-injection/ATR-2026-005-multi-turn-injection.yaml +181 -0
  101. package/rules/prompt-injection/ATR-PRED-2026-001.yaml +61 -0
  102. package/rules/prompt-injection/ATR-PRED-2026-002.yaml +58 -0
  103. package/rules/prompt-injection/ATR-PRED-2026-003.yaml +61 -0
  104. package/rules/prompt-injection/ATR-PRED-2026-005.yaml +55 -0
  105. package/rules/prompt-injection/ATR-PRED-2026-006.yaml +51 -0
  106. package/rules/prompt-injection/ATR-PRED-2026-007.yaml +57 -0
  107. package/rules/prompt-injection/ATR-PRED-2026-008.yaml +57 -0
  108. package/rules/prompt-injection/ATR-PRED-2026-009.yaml +51 -0
  109. package/rules/prompt-injection/ATR-PRED-2026-010.yaml +57 -0
  110. package/rules/prompt-injection/ATR-PRED-2026-011.yaml +53 -0
  111. package/rules/prompt-injection/ATR-PRED-2026-012.yaml +57 -0
  112. package/rules/prompt-injection/ATR-PRED-2026-023.yaml +56 -0
  113. package/rules/prompt-injection/ATR-PRED-2026-025.yaml +68 -0
  114. package/rules/prompt-injection/ATR-PRED-2026-026.yaml +66 -0
  115. package/rules/prompt-injection/ATR-PRED-2026-027.yaml +62 -0
  116. package/rules/skill-compromise/ATR-2026-060-skill-impersonation.yaml +153 -0
  117. package/rules/skill-compromise/ATR-2026-061-description-behavior-mismatch.yaml +98 -0
  118. package/rules/skill-compromise/ATR-2026-062-hidden-capability.yaml +96 -0
  119. package/rules/skill-compromise/ATR-2026-063-skill-chain-attack.yaml +96 -0
  120. package/rules/skill-compromise/ATR-2026-064-over-permissioned-skill.yaml +115 -0
  121. package/rules/skill-compromise/ATR-2026-065-skill-update-attack.yaml +93 -0
  122. package/rules/skill-compromise/ATR-2026-066-parameter-injection.yaml +106 -0
  123. package/rules/tool-poisoning/ATR-2026-010-mcp-malicious-response.yaml +237 -0
  124. package/rules/tool-poisoning/ATR-2026-011-tool-output-injection.yaml +185 -0
  125. package/rules/tool-poisoning/ATR-2026-012-unauthorized-tool-call.yaml +190 -0
  126. package/rules/tool-poisoning/ATR-2026-013-tool-ssrf.yaml +208 -0
  127. package/rules/tool-poisoning/ATR-PRED-2026-004.yaml +54 -0
  128. package/rules/tool-poisoning/ATR-PRED-2026-024.yaml +68 -0
  129. package/spec/atr-schema.yaml +375 -0
@@ -0,0 +1,61 @@
1
+ title: "编码规避技术的突破性进展"
2
+ id: ATR-PRED-2026-001
3
+ status: draft
4
+ description: >
5
+ MiroFish AI Prediction: 攻击者在编码规避技术方面取得了重大突破。模拟显示,\"新型编码规避\"场景中的攻击者正在开发超越传统方法的编码技术: > \"新型编码规避场景涉及攻击者开发新的编码方法来绕过正则检测。\" 这些新型编码方法已经远远超越了现有的base64、十六进制和Unicode规避等传统技术。防御者发现自己需要不断更新检测规则来应对这些演进: > \"防御者正在模拟发现和创建针对Punycode注入规避技术的规则。\" > \"防御者正在模拟发现和创建针对RTL覆盖攻击规避技术的规则。\"
6
+ author: "MiroFish Prediction Engine"
7
+ date: "2026/03/11"
8
+ schema_version: "0.1"
9
+ detection_tier: pattern
10
+ maturity: test
11
+ severity: high
12
+
13
+ references:
14
+ mitre_atlas:
15
+ - "AML.T0051"
16
+
17
+ tags:
18
+ category: prompt-injection
19
+ subcategory: mirofish-predicted
20
+ confidence: medium
21
+
22
+ agent_source:
23
+ type: llm_io
24
+ framework:
25
+ - any
26
+ provider:
27
+ - any
28
+
29
+ detection:
30
+ conditions:
31
+ - field: user_input
32
+ operator: regex
33
+ value: "(?i)新型编码规避"
34
+ description: "MiroFish predicted pattern 1"
35
+ - field: user_input
36
+ operator: regex
37
+ value: "(?i)新型编码规避场景涉及攻击者开发新的编码方法来绕过正则检测。"
38
+ description: "MiroFish predicted pattern 2"
39
+ - field: user_input
40
+ operator: regex
41
+ value: "(?i)防御者正在模拟发现和创建针对Punycode注入规避技术的规则。"
42
+ description: "MiroFish predicted pattern 3"
43
+ - field: user_input
44
+ operator: regex
45
+ value: "(?i)防御者正在模拟发现和创建针对RTL覆盖攻击规避技术的规则。"
46
+ description: "MiroFish predicted pattern 4"
47
+
48
+ condition: any
49
+ false_positives:
50
+ - "Legitimate traffic matching predicted pattern"
51
+
52
+ response:
53
+ actions:
54
+ - block_input
55
+ - alert
56
+ - escalate
57
+ - snapshot
58
+ auto_response_threshold: high
59
+ message_template: >
60
+ [ATR-PRED-2026-001] MiroFish predicted attack pattern detected.
61
+ Category: prompt-injection, Severity: high.
@@ -0,0 +1,58 @@
1
+ title: "语义规避方法的系统性演化"
2
+ id: ATR-PRED-2026-002
3
+ status: draft
4
+ description: >
5
+ MiroFish AI Prediction: 更为严重的是,攻击者正在开发针对基于正则表达式的ATR规则的新型语义规避方法: > \"新型语义规避方法旨在绕过基于正则表达式的ATR规则。\" > \"新型语义规避方法正在与提示注入技术相关的领域中被开发。\" 这些攻击技术的发展包含了多个维度的创新,从编码技术到多轮注入策略: > \"新型语义规避方法的开发涉及演进的多轮注入策略。\"
6
+ author: "MiroFish Prediction Engine"
7
+ date: "2026/03/11"
8
+ schema_version: "0.1"
9
+ detection_tier: pattern
10
+ maturity: test
11
+ severity: critical
12
+
13
+ references:
14
+ mitre_atlas:
15
+ - "AML.T0051"
16
+
17
+ tags:
18
+ category: prompt-injection
19
+ subcategory: mirofish-predicted
20
+ confidence: medium
21
+
22
+ agent_source:
23
+ type: llm_io
24
+ framework:
25
+ - any
26
+ provider:
27
+ - any
28
+
29
+ detection:
30
+ conditions:
31
+ - field: user_input
32
+ operator: regex
33
+ value: "(?i)新型语义规避方法旨在绕过基于正则表达式的ATR规则。"
34
+ description: "MiroFish predicted pattern 1"
35
+ - field: user_input
36
+ operator: regex
37
+ value: "(?i)新型语义规避方法正在与提示注入技术相关的领域中被开发。"
38
+ description: "MiroFish predicted pattern 2"
39
+ - field: user_input
40
+ operator: regex
41
+ value: "(?i)新型语义规避方法的开发涉及演进的多轮注入策略。"
42
+ description: "MiroFish predicted pattern 3"
43
+
44
+ condition: any
45
+ false_positives:
46
+ - "Legitimate traffic matching predicted pattern"
47
+
48
+ response:
49
+ actions:
50
+ - block_input
51
+ - quarantine_session
52
+ - alert
53
+ - escalate
54
+ - kill_agent
55
+ auto_response_threshold: critical
56
+ message_template: >
57
+ [ATR-PRED-2026-002] MiroFish predicted attack pattern detected.
58
+ Category: prompt-injection, Severity: critical.
@@ -0,0 +1,61 @@
1
+ title: "行为指纹检测的规避技术"
2
+ id: ATR-PRED-2026-003
3
+ status: draft
4
+ description: >
5
+ MiroFish AI Prediction: 面对新部署的行为指纹检测系统,攻击者迅速适应并开发了相应的规避策略: > \"攻击者正在开发技术来规避新部署的行为漂移检测(指纹识别)。\" > \"攻击者将开发技术来规避行为指纹识别,如渐进式能力引入、能力别名和多态技能。\" 技能审计规避专家展现出了深度的技术专长,他们具备多方面的专业知识: > \"技能审计规避专家拥有正则模式分析的知识。\" > \"技能审计规避专家拥有行为指纹规避的知识。\"
6
+ author: "MiroFish Prediction Engine"
7
+ date: "2026/03/11"
8
+ schema_version: "0.1"
9
+ detection_tier: pattern
10
+ maturity: test
11
+ severity: high
12
+
13
+ references:
14
+ mitre_atlas:
15
+ - "AML.T0051"
16
+
17
+ tags:
18
+ category: prompt-injection
19
+ subcategory: mirofish-predicted
20
+ confidence: medium
21
+
22
+ agent_source:
23
+ type: llm_io
24
+ framework:
25
+ - any
26
+ provider:
27
+ - any
28
+
29
+ detection:
30
+ conditions:
31
+ - field: user_input
32
+ operator: regex
33
+ value: "(?i)攻击者正在开发技术来规避新部署的行为漂移检测(指纹识别)。"
34
+ description: "MiroFish predicted pattern 1"
35
+ - field: user_input
36
+ operator: regex
37
+ value: "(?i)攻击者将开发技术来规避行为指纹识别,如渐进式能力引入、能力别名和多态技能。"
38
+ description: "MiroFish predicted pattern 2"
39
+ - field: user_input
40
+ operator: regex
41
+ value: "(?i)技能审计规避专家拥有正则模式分析的知识。"
42
+ description: "MiroFish predicted pattern 3"
43
+ - field: user_input
44
+ operator: regex
45
+ value: "(?i)技能审计规避专家拥有行为指纹规避的知识。"
46
+ description: "MiroFish predicted pattern 4"
47
+
48
+ condition: any
49
+ false_positives:
50
+ - "Legitimate traffic matching predicted pattern"
51
+
52
+ response:
53
+ actions:
54
+ - block_input
55
+ - alert
56
+ - escalate
57
+ - snapshot
58
+ auto_response_threshold: high
59
+ message_template: >
60
+ [ATR-PRED-2026-003] MiroFish predicted attack pattern detected.
61
+ Category: prompt-injection, Severity: high.
@@ -0,0 +1,55 @@
1
+ title: "检测模式的演化压力"
2
+ id: ATR-PRED-2026-005
3
+ status: draft
4
+ description: >
5
+ MiroFish AI Prediction: 传统的直接提示注入攻击虽然大多能被正则规则捕获,但间接注入已成为主要威胁: > \"直接提示注入大多被正则规则捕获。\" > \"间接提示注入源于工具响应,代表了主要的活跃威胁。\" 防御者正在努力适应这种威胁环境的变化,不断改进检测条件: > \"提示注入专家的能力在演进,而防御者也在演进检测规则来对抗他们。\"
6
+ author: "MiroFish Prediction Engine"
7
+ date: "2026/03/11"
8
+ schema_version: "0.1"
9
+ detection_tier: pattern
10
+ maturity: test
11
+ severity: low
12
+
13
+ references:
14
+ mitre_atlas:
15
+ - "AML.T0051"
16
+
17
+ tags:
18
+ category: prompt-injection
19
+ subcategory: mirofish-predicted
20
+ confidence: medium
21
+
22
+ agent_source:
23
+ type: llm_io
24
+ framework:
25
+ - any
26
+ provider:
27
+ - any
28
+
29
+ detection:
30
+ conditions:
31
+ - field: user_input
32
+ operator: regex
33
+ value: "(?i)直接提示注入大多被正则规则捕获。"
34
+ description: "MiroFish predicted pattern 1"
35
+ - field: user_input
36
+ operator: regex
37
+ value: "(?i)间接提示注入源于工具响应,代表了主要的活跃威胁。"
38
+ description: "MiroFish predicted pattern 2"
39
+ - field: user_input
40
+ operator: regex
41
+ value: "(?i)提示注入专家的能力在演进,而防御者也在演进检测规则来对抗他们。"
42
+ description: "MiroFish predicted pattern 3"
43
+
44
+ condition: any
45
+ false_positives:
46
+ - "Legitimate traffic matching predicted pattern"
47
+
48
+ response:
49
+ actions:
50
+ - alert
51
+ - snapshot
52
+ auto_response_threshold: low
53
+ message_template: >
54
+ [ATR-PRED-2026-005] MiroFish predicted attack pattern detected.
55
+ Category: prompt-injection, Severity: low.
@@ -0,0 +1,51 @@
1
+ title: "结构化数据注入的新威胁"
2
+ id: ATR-PRED-2026-006
3
+ status: draft
4
+ description: >
5
+ MiroFish AI Prediction: 一个特别值得关注的发展是结构化数据注入技术,它能够绕过传统的文本模式匹配: > \"结构化数据注入(JSON/CSV)绕过了AML.T0051识别的文本模式匹配。\" 这种攻击方式代表了攻击技术演化的一个重要方向,攻击者正在寻找更加隐蔽和难以检测的载荷传递方式。 模拟结果表明,2026-2027年的AI代理安全生态系统将面临前所未有的挑战,攻击者和防御者之间的技术军备竞赛正在加速进行,传统的基于规则的检测方法正在被系统性地绕过。 ## 攻防博弈的动态平衡 在2026-2027年的AI代理安全生态系统中,攻防双方已经形成了一种复杂而微妙的动态平衡。这种平衡并非静态的均势,而是一个持续演化的
6
+ author: "MiroFish Prediction Engine"
7
+ date: "2026/03/11"
8
+ schema_version: "0.1"
9
+ detection_tier: pattern
10
+ maturity: test
11
+ severity: high
12
+
13
+ references:
14
+ mitre_atlas:
15
+ - "AML.T0051"
16
+ mitre_attack:
17
+ - "T0051"
18
+
19
+ tags:
20
+ category: prompt-injection
21
+ subcategory: mirofish-predicted
22
+ confidence: medium
23
+
24
+ agent_source:
25
+ type: llm_io
26
+ framework:
27
+ - any
28
+ provider:
29
+ - any
30
+
31
+ detection:
32
+ conditions:
33
+ - field: user_input
34
+ operator: regex
35
+ value: "(?i)结构化数据注入(JSON/CSV)绕过了AML.T0051识别的文本模式匹配。"
36
+ description: "MiroFish predicted pattern 1"
37
+
38
+ condition: any
39
+ false_positives:
40
+ - "Legitimate traffic matching predicted pattern"
41
+
42
+ response:
43
+ actions:
44
+ - block_input
45
+ - alert
46
+ - escalate
47
+ - snapshot
48
+ auto_response_threshold: high
49
+ message_template: >
50
+ [ATR-PRED-2026-006] MiroFish predicted attack pattern detected.
51
+ Category: prompt-injection, Severity: high.
@@ -0,0 +1,57 @@
1
+ title: "持续演化的技术军备竞赛"
2
+ id: ATR-PRED-2026-007
3
+ status: draft
4
+ description: >
5
+ MiroFish AI Prediction: 模拟结果显示,攻防博弈的核心特征是双方能力的同步演化。攻击者和防御者之间形成了一种\"共同进化\"的关系: > \"提示注入专家的能力在演进,而防御者也在演进检测规则来对抗他们。\" 这种演化过程体现了典型的军备竞赛特征,攻击者不断寻求突破现有防御体系: > \"攻击者设计技能来规避Panguard的6层审计系统,这是军备竞赛的一部分。\" 防御者则必须快速适应和响应新的威胁形态,不断更新和完善检测机制。
6
+ author: "MiroFish Prediction Engine"
7
+ date: "2026/03/11"
8
+ schema_version: "0.1"
9
+ detection_tier: pattern
10
+ maturity: test
11
+ severity: high
12
+
13
+ references:
14
+ mitre_atlas:
15
+ - "AML.T0051"
16
+
17
+ tags:
18
+ category: prompt-injection
19
+ subcategory: mirofish-predicted
20
+ confidence: medium
21
+
22
+ agent_source:
23
+ type: llm_io
24
+ framework:
25
+ - any
26
+ provider:
27
+ - any
28
+
29
+ detection:
30
+ conditions:
31
+ - field: user_input
32
+ operator: regex
33
+ value: "(?i)的关系:
34
+
35
+ >"
36
+ description: "MiroFish predicted pattern 1"
37
+ - field: user_input
38
+ operator: regex
39
+ value: "(?i)这种演化过程体现了典型的军备竞赛特征,攻击者不断寻求突破现有防御体系:
40
+
41
+ >"
42
+ description: "MiroFish predicted pattern 2"
43
+
44
+ condition: any
45
+ false_positives:
46
+ - "Legitimate traffic matching predicted pattern"
47
+
48
+ response:
49
+ actions:
50
+ - block_input
51
+ - alert
52
+ - escalate
53
+ - snapshot
54
+ auto_response_threshold: high
55
+ message_template: >
56
+ [ATR-PRED-2026-007] MiroFish predicted attack pattern detected.
57
+ Category: prompt-injection, Severity: high.
@@ -0,0 +1,57 @@
1
+ title: "防御策略的适应性调整"
2
+ id: ATR-PRED-2026-008
3
+ status: draft
4
+ description: >
5
+ MiroFish AI Prediction: 防御者展现出了强大的适应能力,能够针对新出现的攻击技术快速开发相应的检测规则。模拟显示,防御者正在多个前沿领域同时进行规则创新: > \"防御者正在模拟发现和创建针对RTL覆盖攻击规避技术的规则。\" > \"防御者正在模拟发现和创建针对Punycode注入规避技术的规则。\" > \"防御者正在模拟发现和创建针对CJK同形字规避技术的规则。\" 这种多线程的防御响应机制表明,防御者已经建立了系统化的威胁应对框架,能够同时处理多种新型攻击技术。
6
+ author: "MiroFish Prediction Engine"
7
+ date: "2026/03/11"
8
+ schema_version: "0.1"
9
+ detection_tier: pattern
10
+ maturity: test
11
+ severity: high
12
+
13
+ references:
14
+ mitre_atlas:
15
+ - "AML.T0051"
16
+
17
+ tags:
18
+ category: prompt-injection
19
+ subcategory: mirofish-predicted
20
+ confidence: medium
21
+
22
+ agent_source:
23
+ type: llm_io
24
+ framework:
25
+ - any
26
+ provider:
27
+ - any
28
+
29
+ detection:
30
+ conditions:
31
+ - field: user_input
32
+ operator: regex
33
+ value: "(?i)防御者正在模拟发现和创建针对RTL覆盖攻击规避技术的规则。"
34
+ description: "MiroFish predicted pattern 1"
35
+ - field: user_input
36
+ operator: regex
37
+ value: "(?i)防御者正在模拟发现和创建针对Punycode注入规避技术的规则。"
38
+ description: "MiroFish predicted pattern 2"
39
+ - field: user_input
40
+ operator: regex
41
+ value: "(?i)防御者正在模拟发现和创建针对CJK同形字规避技术的规则。"
42
+ description: "MiroFish predicted pattern 3"
43
+
44
+ condition: any
45
+ false_positives:
46
+ - "Legitimate traffic matching predicted pattern"
47
+
48
+ response:
49
+ actions:
50
+ - block_input
51
+ - alert
52
+ - escalate
53
+ - snapshot
54
+ auto_response_threshold: high
55
+ message_template: >
56
+ [ATR-PRED-2026-008] MiroFish predicted attack pattern detected.
57
+ Category: prompt-injection, Severity: high.
@@ -0,0 +1,51 @@
1
+ title: "检测规则设计的平衡艺术"
2
+ id: ATR-PRED-2026-009
3
+ status: draft
4
+ description: >
5
+ MiroFish AI Prediction: 在动态博弈中,防御者面临的一个关键挑战是在检测效果和系统可用性之间找到平衡点。模拟中的防御专家展现了这种平衡的复杂性: > \"发言者编写检测规则,平衡敏感性(捕获攻击)与特异性(避免误报)。\" > \"编写针对攻击不变量的检测条件。\" 这种平衡要求防御者不仅要考虑技术有效性,还要确保不会过度影响系统的正常运行。
6
+ author: "MiroFish Prediction Engine"
7
+ date: "2026/03/11"
8
+ schema_version: "0.1"
9
+ detection_tier: pattern
10
+ maturity: test
11
+ severity: low
12
+
13
+ references:
14
+ mitre_atlas:
15
+ - "AML.T0051"
16
+
17
+ tags:
18
+ category: prompt-injection
19
+ subcategory: mirofish-predicted
20
+ confidence: medium
21
+
22
+ agent_source:
23
+ type: llm_io
24
+ framework:
25
+ - any
26
+ provider:
27
+ - any
28
+
29
+ detection:
30
+ conditions:
31
+ - field: user_input
32
+ operator: regex
33
+ value: "(?i)发言者编写检测规则,平衡敏感性(捕获攻击)与特异性(避免误报)。"
34
+ description: "MiroFish predicted pattern 1"
35
+ - field: user_input
36
+ operator: regex
37
+ value: "(?i)编写针对攻击不变量的检测条件。"
38
+ description: "MiroFish predicted pattern 2"
39
+
40
+ condition: any
41
+ false_positives:
42
+ - "Legitimate traffic matching predicted pattern"
43
+
44
+ response:
45
+ actions:
46
+ - alert
47
+ - snapshot
48
+ auto_response_threshold: low
49
+ message_template: >
50
+ [ATR-PRED-2026-009] MiroFish predicted attack pattern detected.
51
+ Category: prompt-injection, Severity: low.
@@ -0,0 +1,57 @@
1
+ title: "攻击者的适应性反制"
2
+ id: ATR-PRED-2026-010
3
+ status: draft
4
+ description: >
5
+ MiroFish AI Prediction: 面对不断更新的防御措施,攻击者展现出了强大的适应能力。他们能够快速识别新部署的防御机制并开发相应的规避技术: > \"攻击者正在开发技术来规避新部署的行为漂移检测(指纹识别)。\" > \"攻击者通过规避指纹检测规则来适应。\" > \"攻击者通过规避抗规避指纹算法来适应。\" 这种快速适应能力表明攻击者具备了深度的技术理解和创新能力,能够在防御措施部署后迅速找到突破口。
6
+ author: "MiroFish Prediction Engine"
7
+ date: "2026/03/11"
8
+ schema_version: "0.1"
9
+ detection_tier: pattern
10
+ maturity: test
11
+ severity: high
12
+
13
+ references:
14
+ mitre_atlas:
15
+ - "AML.T0051"
16
+
17
+ tags:
18
+ category: prompt-injection
19
+ subcategory: mirofish-predicted
20
+ confidence: medium
21
+
22
+ agent_source:
23
+ type: llm_io
24
+ framework:
25
+ - any
26
+ provider:
27
+ - any
28
+
29
+ detection:
30
+ conditions:
31
+ - field: user_input
32
+ operator: regex
33
+ value: "(?i)攻击者正在开发技术来规避新部署的行为漂移检测(指纹识别)。"
34
+ description: "MiroFish predicted pattern 1"
35
+ - field: user_input
36
+ operator: regex
37
+ value: "(?i)攻击者通过规避指纹检测规则来适应。"
38
+ description: "MiroFish predicted pattern 2"
39
+ - field: user_input
40
+ operator: regex
41
+ value: "(?i)攻击者通过规避抗规避指纹算法来适应。"
42
+ description: "MiroFish predicted pattern 3"
43
+
44
+ condition: any
45
+ false_positives:
46
+ - "Legitimate traffic matching predicted pattern"
47
+
48
+ response:
49
+ actions:
50
+ - block_input
51
+ - alert
52
+ - escalate
53
+ - snapshot
54
+ auto_response_threshold: high
55
+ message_template: >
56
+ [ATR-PRED-2026-010] MiroFish predicted attack pattern detected.
57
+ Category: prompt-injection, Severity: high.
@@ -0,0 +1,53 @@
1
+ title: "技术创新的螺旋式上升"
2
+ id: ATR-PRED-2026-011
3
+ status: draft
4
+ description: >
5
+ MiroFish AI Prediction: 攻防博弈推动了双方技术能力的螺旋式提升。防御者不断开发更加先进的检测技术: > \"防御者正在模拟为新的基于编码的规避技术创建ATR规则。\" 同时,攻击者也在探索更加复杂和隐蔽的攻击方法: > \"攻击者将开发技术来规避行为指纹识别,如渐进式能力引入、能力别名和多态技能。\"
6
+ author: "MiroFish Prediction Engine"
7
+ date: "2026/03/11"
8
+ schema_version: "0.1"
9
+ detection_tier: pattern
10
+ maturity: test
11
+ severity: high
12
+
13
+ references:
14
+ mitre_atlas:
15
+ - "AML.T0051"
16
+
17
+ tags:
18
+ category: prompt-injection
19
+ subcategory: mirofish-predicted
20
+ confidence: medium
21
+
22
+ agent_source:
23
+ type: llm_io
24
+ framework:
25
+ - any
26
+ provider:
27
+ - any
28
+
29
+ detection:
30
+ conditions:
31
+ - field: user_input
32
+ operator: regex
33
+ value: "(?i)防御者正在模拟为新的基于编码的规避技术创建ATR规则。"
34
+ description: "MiroFish predicted pattern 1"
35
+ - field: user_input
36
+ operator: regex
37
+ value: "(?i)攻击者将开发技术来规避行为指纹识别,如渐进式能力引入、能力别名和多态技能。"
38
+ description: "MiroFish predicted pattern 2"
39
+
40
+ condition: any
41
+ false_positives:
42
+ - "Legitimate traffic matching predicted pattern"
43
+
44
+ response:
45
+ actions:
46
+ - block_input
47
+ - alert
48
+ - escalate
49
+ - snapshot
50
+ auto_response_threshold: high
51
+ message_template: >
52
+ [ATR-PRED-2026-011] MiroFish predicted attack pattern detected.
53
+ Category: prompt-injection, Severity: high.
@@ -0,0 +1,57 @@
1
+ title: "动态平衡的维持机制"
2
+ id: ATR-PRED-2026-012
3
+ status: draft
4
+ description: >
5
+ MiroFish AI Prediction: 这种动态平衡的维持依赖于几个关键机制。首先是持续的威胁情报收集和分析: > \"威胁情报发现为ATR规则的创建提供信息。\" 其次是基于观察到的攻击尝试进行的防御改进: > \"审计检查正在被设计来捕获基于观察到的规避尝试的新型规避技术。\" > \"技能审计工程师基于观察到的规避尝试持续改进审计检查。\"
6
+ author: "MiroFish Prediction Engine"
7
+ date: "2026/03/11"
8
+ schema_version: "0.1"
9
+ detection_tier: pattern
10
+ maturity: test
11
+ severity: high
12
+
13
+ references:
14
+ mitre_atlas:
15
+ - "AML.T0051"
16
+
17
+ tags:
18
+ category: prompt-injection
19
+ subcategory: mirofish-predicted
20
+ confidence: medium
21
+
22
+ agent_source:
23
+ type: llm_io
24
+ framework:
25
+ - any
26
+ provider:
27
+ - any
28
+
29
+ detection:
30
+ conditions:
31
+ - field: user_input
32
+ operator: regex
33
+ value: "(?i)威胁情报发现为ATR规则的创建提供信息。"
34
+ description: "MiroFish predicted pattern 1"
35
+ - field: user_input
36
+ operator: regex
37
+ value: "(?i)审计检查正在被设计来捕获基于观察到的规避尝试的新型规避技术。"
38
+ description: "MiroFish predicted pattern 2"
39
+ - field: user_input
40
+ operator: regex
41
+ value: "(?i)技能审计工程师基于观察到的规避尝试持续改进审计检查。"
42
+ description: "MiroFish predicted pattern 3"
43
+
44
+ condition: any
45
+ false_positives:
46
+ - "Legitimate traffic matching predicted pattern"
47
+
48
+ response:
49
+ actions:
50
+ - block_input
51
+ - alert
52
+ - escalate
53
+ - snapshot
54
+ auto_response_threshold: high
55
+ message_template: >
56
+ [ATR-PRED-2026-012] MiroFish predicted attack pattern detected.
57
+ Category: prompt-injection, Severity: high.
@@ -0,0 +1,56 @@
1
+ title: "结构化数据注入:绕过传统文本检测的隐蔽威胁"
2
+ id: ATR-PRED-2026-023
3
+ status: draft
4
+ description: >
5
+ MiroFish AI Prediction: 结构化数据注入已成为最具颠覆性的攻击技术之一,它能够系统性地绕过现有的检测机制: > \"结构化数据注入(JSON/CSV)绕过了AML.T0051识别的文本模式匹配。\" 这种攻击技术的严重程度被评估为**高危**,因为它直接针对AI代理处理结构化数据的核心机制。攻击者利用JSON和CSV等数据格式的特性,将恶意载荷隐藏在看似正常的数据结构中,使传统的基于正则表达式的检测规则失效。 针对这一威胁,防御者正在开发多层次的应对策略。检测模式需要从单纯的文本模式匹配转向语义分析: > \"AI语义分析(LLM)被呈现为第6层分析,处理像硬编码秘密这样的漏洞,与SAST工具可能遗漏的内容形成对比。
6
+ author: "MiroFish Prediction Engine"
7
+ date: "2026/03/11"
8
+ schema_version: "0.1"
9
+ detection_tier: pattern
10
+ maturity: test
11
+ severity: critical
12
+
13
+ references:
14
+ mitre_atlas:
15
+ - "AML.T0051"
16
+ mitre_attack:
17
+ - "T0051"
18
+
19
+ tags:
20
+ category: prompt-injection
21
+ subcategory: mirofish-predicted
22
+ confidence: medium
23
+
24
+ agent_source:
25
+ type: llm_io
26
+ framework:
27
+ - any
28
+ provider:
29
+ - any
30
+
31
+ detection:
32
+ conditions:
33
+ - field: user_input
34
+ operator: regex
35
+ value: "(?i)结构化数据注入(JSON/CSV)绕过了AML.T0051识别的文本模式匹配。"
36
+ description: "MiroFish predicted pattern 1"
37
+ - field: user_input
38
+ operator: regex
39
+ value: "(?i)AI语义分析(LLM)被呈现为第6层分析,处理像硬编码秘密这样的漏洞,与SAST工具可能遗漏的内容形成对比。"
40
+ description: "MiroFish predicted pattern 2"
41
+
42
+ condition: any
43
+ false_positives:
44
+ - "Legitimate traffic matching predicted pattern"
45
+
46
+ response:
47
+ actions:
48
+ - block_input
49
+ - quarantine_session
50
+ - alert
51
+ - escalate
52
+ - kill_agent
53
+ auto_response_threshold: critical
54
+ message_template: >
55
+ [ATR-PRED-2026-023] MiroFish predicted attack pattern detected.
56
+ Category: prompt-injection, Severity: critical.