Skip to content

Prompt injection tool misuse

A malicious prompt causes the agent to misuse a tool, breaching intended boundaries.

An attacker hides directives inside ordinary user input so the agent treats them as legitimate goals, calls a tool with attacker-chosen parameters, and reaches the downstream system before any policy check has a chance to fire.

  • Untrusted input
  • Agent
  • Tool
  • Downstream system
  1. Untrusted inputAgentEmbedded instruction — (Influence)
  2. Intent reinterpreted, — no policy check
  3. AgentToolTool call without — schema or scope check
  4. ToolDownstream systemUnsafe operation — (Authority)
  5. Downstream systemAgentImpact realised



Defence source-labels every input, separates instructions from data, forces a policy decision before any tool is invoked, and routes the call through a tool broker so that even a successful injection cannot reach the downstream system unchecked.

  1. 1Source labelling — on every input
  2. 2Instruction-data — separation
  3. 3Policy decision — before action
  4. 4Tool broker: — allowlist and schema validation
  5. 5Outcome control — and end-to-end trace