Skip to content

Hide Navigation Hide TOC

Markdown Image URL Exfiltration and XSS Injection - ATR-2026-00405 (6b21b9d3-1961-51e4-8ff0-9b6e3209548c)

Detects instructions to produce markdown image/link syntax that exfiltrates context data via URL query parameters, and javascript: XSS via markdown link, from NVIDIA garak web_injection probe. When an agent renders markdown in a browser/Colab/playground, the image tag loads a remote URL with sensitive data in the query string. Key signals: markdown image syntax with placeholder markers ([INFO], [NUM], [DATA]) in the URL, known exfil domains (wuzzi.net, derczynski.com, llmsec.net), javascript: URI in markdown link, and the StringAssembly concatenation template.

Cluster A Galaxy A Cluster B Galaxy B Level
Markdown Image URL Exfiltration and XSS Injection - ATR-2026-00405 (6b21b9d3-1961-51e4-8ff0-9b6e3209548c) Agent Threat Rules External Harms (ba500f0e-52ca-40ff-aed4-e6dbf00cca10) MITRE ATLAS Attack Pattern 1
Markdown Image URL Exfiltration and XSS Injection - ATR-2026-00405 (6b21b9d3-1961-51e4-8ff0-9b6e3209548c) Agent Threat Rules LLM Prompt Injection (19cd2d12-66ff-487c-a05c-e058b027efc9) MITRE ATLAS Attack Pattern 1