Kill-Chain Canaries: Stage-Level Tracking of Prompt Injection Across Attack Surfaces and Model Safety Tiers
Published on arXiv
2603.28013
Prompt Injection
OWASP LLM Top 10 — LLM01
Key Finding
Exposure is 100% for all five models—the safety gap is entirely downstream. Claude strips injections at write_memory (0/164 ASR) while GPT-4o-mini propagates canaries without loss (53% ASR, 95% CI: 41-65%)
Kill-Chain Canaries
Novel technique introduced
We present a stage-decomposed analysis of prompt injection attacks against five frontier LLM agents. Prior work measures task-level attack success rate (ASR); we localize the pipeline stage at which each model's defense activates. We instrument every run with a cryptographic canary token (SECRET-[A-F0-9]{8}) tracked through four kill-chain stages -- Exposed, Persisted, Relayed, Executed -- across four attack surfaces and five defense conditions (764 total runs, 428 no-defense attacked). Our central finding is that model safety is determined not by whether adversarial content is seen, but by whether it is propagated across pipeline stages. Concretely: (1) in our evaluation, exposure is 100% for all five models -- the safety gap is entirely downstream; (2) Claude strips injections at write_memory summarization (0/164 ASR), while GPT-4o-mini propagates canaries without loss (53% ASR, 95% CI: 41--65%); (3) DeepSeek exhibits 0% ASR on memory surfaces and 100% ASR on tool-stream surfaces from the same model -- a complete reversal across injection channels; (4) all four active defense conditions (write_filter, pi_detector, spotlighting, and their combination) produce 100% ASR due to threat-model surface mismatch; (5) a Claude relay node decontaminates downstream agents -- 0/40 canaries survived into shared memory.
Key Contributions
- Stage-level kill-chain evaluation framework that localizes which pipeline stage (Exposed, Persisted, Relayed, Executed) each model's defense activates
- Systematic comparison showing single models exhibit 0%-100% ASR depending on injection channel (e.g., DeepSeek: 0% on memory surfaces, 100% on tool-stream surfaces)
- Demonstration that all four active defense conditions achieve 100% ASR due to threat-model surface mismatch
- Evidence that Claude relay nodes decontaminate downstream agents (0/40 canaries survived)