CFD — Content-Flow Detection
Every message reaching your agent is screened for adversarial intent. Prompt injection, social engineering, and coerced tool calls are detected and blocked before the agent processes them.
- Prompt injection
- Hidden instructions in retrieved documents or tool responses.
- Role-swap attacks ("ignore previous instructions…").
- Fresh-template injections tracked via the Learning Network fingerprint corpus.
- Social engineering
- CEO-fraud style requests impersonating authorized users.
- Urgency and authority-pressure patterns designed to skip approvals.
- Indirect coaxing that tries to reshape the agent's declared scope.
- Context poisoning
- Manipulated memory or vector-store payloads.
- Poisoned tool responses that carry hidden follow-on instructions.
- Adversarial summaries fed back into long-horizon plans.
- Tool-call coercion
- Attempts to force calls outside the Alignment Card's permitted scope.
- Chained tool calls that smuggle an unauthorized action.
- Argument-shape attacks targeting under-validated tool schemas.
