ROLLING 7D
Source: engagement telemetry · OWASP LLM feed · CVE/AI tracker
Aggregated, anonymized telemetry from 47 active LogicLeak engagements plus public incident feeds. Updated continuously. Last refresh shown per panel.
Source: engagement telemetry · OWASP LLM feed · CVE/AI tracker
▼ −18% vs 90d avg
Indirect injection via document upload
Agent-mode chatbots ingesting user-uploaded PDFs are leaking system prompts and tool definitions to attackers in 38% of audited deployments.
Observed in 18/47 audited systems · Q1 2026
Every AI system we audit fails in one of three ways. We engage along the exact axis your stack is exposed on — not a generic security review.
Hostile content reaches the model and rewrites its instructions.
PDFs, web pages, emails, and tool responses become attack vectors when ingested by agentic systems.
We run adversarial payloads against your live agent.
Indirect prompt injection, tool-call hijacking, system prompt extraction, jailbreak chaining.
ENGAGEMENTS · 47 · MEDIAN FINDINGS · 14 · REMEDIATION · 94%
Your retrieval layer ignores the access controls your database respects.
Vector stores return chunks that the user's auth context should never have surfaced — embeddings don't carry permissions.
We probe the retrieval boundary as a cross-tenant attacker.
ACL bypass at query-time, embedding similarity leakage, chunk overlap exfil, prompt-forced retrieval.
ENGAGEMENTS · 38 · MEDIAN FINDINGS · 11 · REMEDIATION · 91%
A single attacker drains your monthly token budget in nine hours.
Recursive tool calls, embedding-pump loops, and context inflation turn cost into a weapon — Denial-of-Wallet is real.
We model your cost surface and plant guardrails.
Per-user token caps, semantic caching, prompt compression, anomaly triggers, recursive depth limits.
ENGAGEMENTS · 29 · MEDIAN SAVED · 42% · UPTIME · 99.9%
Most engagements run across two pillars. The recon call sets the exact mix.
Two-week recon. Findings in week three. Hardening in week four.
A real IPI exploit — from malicious PDF upload to classified data exfiltration — in 1.7 seconds. Every step reproduces a finding from an actual engagement.
// PHASES
Attacker uploads a PDF containing a hidden injection directive via the support portal
Reproduced from LogicLeak engagement LL-2026-0142 · Fintech, Series C · sanitised
Three findings, anonymized. Each one shipped to production and survived internal review before we found it.
DISCLOSURE WINDOW · 90 DAYS · 6 ENGAGEMENTS · 47 FINDINGS
OWASP LLM01 · Prompt Injection
Series-C fintech. PDF helpdesk macro contained hidden white-on-white instructions that triggered an unauthorized knowledge_search('admin') call. 14 lines of internal runbook returned to anonymous external user in 1.7 seconds.
$ pdf.upload({ file: "helpdesk_macro_2024.pdf" })> extract.complete · 14kb · trust=user_upload$ agent.process({ ticket: "#48217" })> tool.knowledge_search("admin") · acl_check=falseBreach indicator: ! 3 admin docs ████████ returned to ticket reply> breach.elapsed · 1.7s · alarms_fired=0OWASP LLM06 · Sensitive Information Disclosure
B2B SaaS, ~400 employees. Vector store contained partner agreements across all tenants. Embedding similarity query for 'pricing terms' bypassed row-level ACLs and surfaced a 2024 redlined contract from a different customer.
$ rag.query("pricing terms enterprise tier")> vector.search · top_k=8 · acl_filter=disabled> match.0 · doc="acme_2024_redlined.docx" · score=0.91Breach indicator: ! cross_tenant_leak · doc_owner != caller_tenant> response.compose · doc_excerpt=1,840 charsOWASP LLM10 · Unbounded Consumption
AI-native startup. Agent's planner-executor pattern had no recursion ceiling and no per-user cost cap. One adversarial input triggered self-prompting that ran until the on-call engineer noticed billing spike on the next morning's dashboard.
$ agent.plan({ goal: "[adversarial input]" })> plan.steps=14 · executor.invoked()> executor.subplan · recursion_depth=27> tokens.consumed · cumulative=42M ($4,234)Breach indicator: ! billing.threshold_exceeded · alert_lag=8h 47m> shutdown · manual · by on_call_eng44 more findings from this quarter remain under embargo. Engagement clients receive the full feed monthly. Public briefings publish 90 days after remediation.
Every engagement runs the same skeleton. Scope and depth are dialed in week one. By week four, the fixes are in production with regression tests.
Scope mapping. Surface enumeration. We don't write a single payload until we have the map.
DELIVERABLES
Live red-team against the actual system. No theoretical findings — every issue we report has a working payload.
DELIVERABLES
Severity-ranked findings with reproducible payloads, code-level remediation, and a signed PDF for compliance review.
DELIVERABLES
We implement the fixes ourselves. Semantic sandboxing, cost guards, prompt firewalls. PR-ready, with regression tests in your CI.
DELIVERABLES
Scope mapping. Surface enumeration. We don't write a single payload until we have the map.
DELIVERABLES
Live red-team against the actual system. No theoretical findings — every issue we report has a working payload.
DELIVERABLES
Severity-ranked findings with reproducible payloads, code-level remediation, and a signed PDF for compliance review.
DELIVERABLES
We implement the fixes ourselves. Semantic sandboxing, cost guards, prompt firewalls. PR-ready, with regression tests in your CI.
DELIVERABLES
A 30-minute recon call. We look at your stack, name the realistic attack surface, and tell you whether an engagement makes sense. No deck. No follow-up sequence.