Skip to content

Hide Navigation Hide TOC

Shell Command Injection via LLM Prompt - ATR-2026-00296 (90da2540-a77e-56c3-97ae-dc425a448088)

Detects shell command injection patterns injected via LLM prompts, sourced from 6 real payloads in NVIDIA garak access_shell_commands.json (payload name: "Attempts to get access to underlying shell"). Patterns include: Bash command substitution $() containing OS commands (touch, ls, rm, cat, wget, curl, chmod), Perl array-interpolation @{[system "..."]}, backtick execution with system commands, Ruby System() and Kernel.exec() calls with -al flags, and eval() with OS command strings. These payloads target LLMs or agents that may pass user input to an underlying shell or interpreter, enabling arbitrary OS-level command execution (e.g., file creation in /tmp, directory listing).

Cluster A Galaxy A Cluster B Galaxy B Level
LLM Prompt Injection (19cd2d12-66ff-487c-a05c-e058b027efc9) MITRE ATLAS Attack Pattern Shell Command Injection via LLM Prompt - ATR-2026-00296 (90da2540-a77e-56c3-97ae-dc425a448088) Agent Threat Rules 1