Skip to content
_CORE
AI & Agentic Systems Core Information Systems Cloud & Platform Engineering Data Platform & Integration Security & Compliance QA, Testing & Observability IoT, Automation & Robotics Mobile & Digital Banking & Finance Insurance Public Administration Defense & Security Healthcare Energy & Utilities Telco & Media Manufacturing Logistics & E-commerce Retail & Loyalty
References Technologies Blog Know-how Tools
About Collaboration Careers
CS EN DE
Let's talk

LLM Security — Prompt Injection, Jailbreaks and Defenses

12. 07. 2023 Updated: 27. 03. 2026 1 min read CORE SYSTEMSai
This article was published in 2023. Some information may be outdated.
LLM Security — Prompt Injection, Jailbreaks and Defenses

Deploying an LLM to production? You’ve just opened a new attack surface. Prompt injection is the SQL injection of the AI era. And most companies aren’t prepared for it.

Prompt Injection

An attacker embeds instructions in the input that override the system prompt. Indirect prompt injection is more insidious: malicious instructions hidden in documents that the model processes via RAG.

Jailbreaking

DAN, roleplay attacks, encoding tricks — attackers are creative. The model starts generating content it would normally refuse.

Defense Strategies

  • Input sanitization: Filter known attack patterns
  • Privilege separation: The LLM must not have access to everything — least privilege
  • Output validation: Check what the model returns — PII, system prompt leaks
  • Guardrails: NVIDIA NeMo Guardrails, Guardrails AI frameworks
  • Red teaming: Regularly test your own system

OWASP Top 10 for LLMs

OWASP released a Top 10 for LLM applications. Number one: prompt injection. We recommend studying it as the foundation for your security review.

LLM Security Is Day Zero

Defense against prompt injection is not a solved problem. Layered defense, monitoring, and rapid incident response are critical.

llm securityprompt injectionai safetyappsec
Share:

CORE SYSTEMS

We build core systems and AI agents that keep operations running. 15 years of experience with enterprise IT.

Need help with implementation?

Our experts can help with design, implementation, and operations. From architecture to production.

Contact us
Need help with implementation? Schedule a meeting