Veridicus Scan Local Evidence for AI-Bound Content
Download app

Blog

Notes on prompt injection, hidden instructions, and safer AI intake.

The newest post explains how to scan resumes, cover letters, and candidate links before AI review, why hiring teams need an intake layer for AI-assisted screening, and where Veridicus Scan fits in that workflow. The earlier explainers cover visual prompt injection, MCP security, OWASP, risk reduction, RAG, real-world prompt injection examples, and core prompt injection basics.

RAG prompt injection explained

A builder-friendly guide to how retrieved chunks turn into instructions, how that differs from retrieval poisoning, and why private knowledge bases can leak.

Prompt injection examples

A plain-language guide to where hidden instructions show up in real content, including webpages, emails, PDFs, tool output, and parser-visible metadata.

Prompt injection vs jailbreaking

A plain-language guide to where prompt injection and jailbreaking overlap, how they differ, and why the distinction matters for AI agents, tools, and connected data.

What is indirect prompt injection?

A plain-language guide to hidden instructions in webpages, emails, files, and tool output, with the direct-vs-indirect distinction, agent risk, and practical ways to reduce exposure.

What is prompt injection?

A plain-language guide to prompt injection: what it is, how direct and indirect attacks work, why AI agents raise the stakes, and what reduces risk in practice.