A curated list of resources for understanding, detecting, and mitigating prompt injection attacks against machine learning models.
Awesome Prompt Injection is a curated GitHub repository that serves as an educational hub and resource collection for the cybersecurity vulnerability known as prompt injection. It focuses on attacks that target machine learning models, particularly large language models (LLMs), by crafting malicious inputs that trick the model into deviating from its intended behavior. The project aggregates articles, research papers, tools, tutorials, and community links to help practitioners understand, detect, and defend against these threats.
AI/ML developers, application security engineers (AppSec), red teamers, and security researchers who are building or securing applications that integrate LLMs and AI agents. It is also valuable for anyone involved in AI safety and adversarial machine learning.
It provides a single, continuously updated source of truth for a complex and rapidly evolving security threat. Instead of scattered research, developers get a vetted collection of practical resources, hands-on challenges, and links to authoritative standards, significantly accelerating their learning and implementation of defenses.
Learn about a type of vulnerability that specifically targets machine learning models
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.
Aggregates vetted articles, research papers, and tools from industry leaders like OWASP and MITRE ATLAS, ensuring reliable and authoritative content for practitioners.
Includes CTF challenges such as PromptTrace and Gandalf, along with tutorials that provide real-world attack simulations, helping users gain experiential knowledge.
Links directly to frameworks like OWASP's Gen AI Security Project, keeping the repository aligned with evolving best practices and threat modeling standards.
Tracks recent developments like indirect injection and AI worms, with resources from 2025-26, ensuring relevance in a fast-moving field.
It's a collection of links and resources, not a functional library or API, requiring users to seek out and integrate external tools for practical implementation.
The README highlights that deterministic guarantees against prompt injection are not achievable, which may frustrate teams looking for foolproof security solutions.
With numerous categories and dense technical content, it can be overwhelming for users without a structured learning path, despite the categorization.