AI Security CTF (free, open) – prompt injection, agent workflow hijacking, guardrail bypass – June 17-22
Hi r/netsec, I work in DevRel at KubeArmor, a CNCF open source runtime security project. We built an AI security CTF that covers attack surfaces most traditional CTFs don’t touch yet, and I think this community would find it interesting. Three tracks, 18 challenges: Prompt Injection Lab – system instruction override, persona drift via roleplay/translation, multi-turn memory manipulation, indirect injection through poisoned context, guardrail filter bypass Agent Workflow Hijack – coercing agent tool misuse, poisoning indexed sources with hidden instructions, manipulating fake approval gates, exploiting agent memory as a prompt injection surface, chaining tool calls to exfiltrate secrets Hidden API & Guardrail Bypass – triggering debug endpoints, tampering safety mode parameters via DevTools, abusing export features for data leaks, intercepting streamed responses before redaction kicks in, replaying weak preview tokens The whole thing runs in the browser. No cluster access, no local tools needed. We wanted to remove friction so people could focus on the actual exploitation. It’s free, individual play, CTFd-scored. June 17-22. $1,000+ in prizes for top performers. If you have thoughts on the challenge design or want to discuss AI threat modeling approaches, I’m all ears. submitted by /u/HighnessAtharva [link] [comments]Technical Information Security Content & DiscussionRead More