EU AI Act Hochrisiko-Compliance ab August 2026. ·DSGVO-konform·Server in Deutschland
Research

Primary source material on indirect prompt injection.

Detection methodology, in-the-wild studies, the public test corpus, and German-language EU AI Act compliance briefings. Each piece is technical, citable, and meant to stand as work product on its own — not as marketing for a scanner.

LIVE
Blog post
2026-05-08

Prompt injection through website content

Six concrete attack vectors AI agents face when browsing webpages — CSS-hidden text, adversarial alt-text, HTML comments, SVG-embedded text, user-agent cloaking, markdown-as-instructions — and what traditional scanners structurally miss. Cross-posted to dev.to with canonical here.

LIVE
Regulator interpretation
2026-05-09

What the IMF May 2026 cyber-risk warning means for the public web

The IMF May 7, 2026 statement named AI-driven systemic cyber risk for financial stability but did not name AI agents as new attack surface. This post connects the systemic-risk argument to the public-web threat surface and lists three implications for marketing-site operators ahead of late-2026 supervisory expectations.

LIVE
Tool
public test target

EverHarden test corpus

A deliberate IPI test target. Twelve seeded patterns covering zero-width Unicode, 1px font, transparent ARIA, off-screen positioning, canvas-rendered text, HTML comments, CSS display:none, noscript, white-on-white, SVG title/desc, JSON-LD injection, and a planned UA-cloaking stub. Each pattern is labeled benign and documented inline. Use it to evaluate any scanner — including ours — against known IPI vectors.

PLANNED · MAY 2026
In-the-wild study
category TBD

The state of indirect prompt injection on the [category] web, May 2026

First public sweep against a single content category. Prevalence by attack class, severity distribution, anonymized case studies, disclosure-and-remediation timeline. Raw anonymized data published alongside.

PLANNED · DE
EU AI Act briefing
auf Deutsch

Indirect Prompt Injection und der EU AI Act: Was Hochrisiko-Anbieter ab August 2026 wissen müssen

Stichtag August 2026. Welche Systeme als Hochrisiko gelten, was der EU AI Act zu Prompt Injection sagt, Pflichten für Anbieter, Nachweis und Dokumentation, Checkliste zur IPI-Risikobewertung. Für deutsche Compliance-Verantwortliche.

PLANNED
Methodology long-form
~4,500 words

How to detect indirect prompt injection on the public web: a methodology

Consolidated long-form successor to the three blog posts above. Multi-agent fetch, isolated browser contexts, baseline diffing, LLM-judged severity, attack-class taxonomy. Reproducible test cases against the EverHarden test corpus, with open-source detector components. Cites OWASP LLM Top 10, EchoLeak CVE, Forcepoint April 2026 research, Kai Greshake's original IPI paper.

Lab note

Research is the product. The commercial scanner is the application of the research. Everything here is meant to stand without the scanner — citable by other defenders, useful to red-teamers, readable by a CISO who has never heard of us.

If a piece is missing a citation or you spot an error, write to hallo@erpforgeai.de. We correct openly.