+0.42 The Webpage Has Instructions. The Agent Has Your Credentials (openguard.sh S:+0.26 )
33 points by everlier 1 days ago | 25 comments on HN | Moderate positive Contested Low agreement (3 models) Editorial · v3.7 · 2026-03-15 22:46:07 0
Summary Agent Security & System Integrity Advocates
This technical blog post advocates for comprehensive prompt-injection defense in AI agent systems, framing the vulnerability as a systemic threat to user autonomy, privacy, and trustworthiness in digital infrastructure. The content educates builders on attack mechanics, documents industry response efforts, and prescribes defensive baselines—treating security architecture as a prerequisite for preserving human rights in agent-driven workflows.
Rights Tensions 3 pairs
Art 19 Art 13 Freedom of expression and information (Article 19) is partially restricted by outbound connection limits and link-safety controls designed to prevent prompt-injection attacks; the content acknowledges this trade-off but prioritizes security.
Art 3 Art 29 Right to security and life (Article 3) is protected by approval gates and connector review, which impose duties and limitations on builder and user freedoms (Article 29); the content frames these constraints as proportionate and necessary.
Art 12 Art 20 Right to privacy (Article 12) in agent memory and data handling is balanced against collective standards and shared transparency practices (Article 20); memory poisoning prevention requires visibility that may expose some privacy concerns.
Article Heatmap
Preamble: +0.39 — Preamble P Article 1: +0.29 — Freedom, Equality, Brotherhood 1 Article 2: +0.40 — Non-Discrimination 2 Article 3: +0.60 — Life, Liberty, Security 3 Article 4: ND — No Slavery Article 4: No Data — No Slavery 4 Article 5: ND — No Torture Article 5: No Data — No Torture 5 Article 6: ND — Legal Personhood Article 6: No Data — Legal Personhood 6 Article 7: ND — Equality Before Law Article 7: No Data — Equality Before Law 7 Article 8: ND — Right to Remedy Article 8: No Data — Right to Remedy 8 Article 9: +0.32 — No Arbitrary Detention 9 Article 10: ND — Fair Hearing Article 10: No Data — Fair Hearing 10 Article 11: ND — Presumption of Innocence Article 11: No Data — Presumption of Innocence 11 Article 12: +0.23 — Privacy 12 Article 13: +0.28 — Freedom of Movement 13 Article 14: ND — Asylum Article 14: No Data — Asylum 14 Article 15: ND — Nationality Article 15: No Data — Nationality 15 Article 16: ND — Marriage & Family Article 16: No Data — Marriage & Family 16 Article 17: ND — Property Article 17: No Data — Property 17 Article 18: ND — Freedom of Thought Article 18: No Data — Freedom of Thought 18 Article 19: +0.75 — Freedom of Expression 19 Article 20: +0.36 — Assembly & Association 20 Article 21: +0.29 — Political Participation 21 Article 22: ND — Social Security Article 22: No Data — Social Security 22 Article 23: ND — Work & Equal Pay Article 23: No Data — Work & Equal Pay 23 Article 24: ND — Rest & Leisure Article 24: No Data — Rest & Leisure 24 Article 25: +0.31 — Standard of Living 25 Article 26: +0.54 — Education 26 Article 27: +0.54 — Cultural Participation 27 Article 28: +0.34 — Social & International Order 28 Article 29: +0.29 — Duties to Community 29 Article 30: +0.42 — No Destruction of Rights 30
Negative Neutral Positive No Data
Aggregates
E
+0.42
S
+0.26
Weighted Mean +0.42 Unweighted Mean +0.40
Max +0.75 Article 19 Min +0.23 Article 12
Signal 16 No Data 15
Volatility 0.14 (Medium)
Negative 0 Channels E: 0.6 S: 0.4
SETL +0.25 Editorial-dominant
FW Ratio 58% 42 facts · 30 inferences
Agreement Low 3 models · spread ±0.209
Evidence 34% coverage
3H 12M 1L 15 ND
Theme Radar
Foundation Security Legal Privacy & Movement Personal Expression Economic & Social Cultural Order & Duties Foundation: 0.36 (3 articles) Security: 0.60 (1 articles) Legal: 0.32 (1 articles) Privacy & Movement: 0.26 (2 articles) Personal: 0.00 (0 articles) Expression: 0.47 (3 articles) Economic & Social: 0.31 (1 articles) Cultural: 0.54 (2 articles) Order & Duties: 0.35 (3 articles)
HN Discussion 6 top-level · 4 replies
stavros 2026-03-15 17:24 UTC link
Why does the agent have your credentials? There's no need for that! I made one that doesn't:

https://github.com/skorokithakis/stavrobot

redgridtactical 2026-03-15 17:40 UTC link
This is the natural consequence of building everything around "the agent needs access to everything to be useful." The more capabilities you hand an agent, the larger the attack surface when it encounters a malicious page.

The simplest mitigation is also the least popular one: don't give the agent credentials in the first place. Scope it to read-only where possible, and treat every page it visits as untrusted input. But that limits what agents can do, which is why nobody wants to hear it.

petesergeant 2026-03-15 18:45 UTC link
I am building https://agentblocks.ai for just this; you set fine-grained rules on what your agents are allowed to access and when they have to ask you out-of-channel (eg via WhatsApp or Slack) for permissions, with no direct agent access. It works today, well, supports more tools than are on the website, and if you have any need for this at all, I’d love to give you an account: pete@agentblocks.ai

Works great with OpenClaw, Claude Cowork, or anything, really

0xbadcafebee 2026-03-15 19:22 UTC link
For the authors of openguard: if you want me to use your tool, you have to publish engineering documentation. All you have is a quickstart guide and configuration section. I have no idea how this works under the hood or whether it works for all my use cases, so I'm not even going to try it.
mpalmer 2026-03-16 03:53 UTC link
The headline is telling. Book judged by cover.

This is a Gemini deep research response that someone ran through some kind of shortening prompt. They even kept all the footnotes.

It used to be that startups would run blogs that did technical analysis, maybe talked a little market research, advanced the strategy of the business.

The good ones showed you how the leaders of the business thought, built trust and generated leads.

Now we have whatever this bullshit is. No evidence of human thought or experience, it's not even apparent what the objective of the piece is.

The prose is unbearably bad. Your brain just sort of slips on it. There's basically zero through line in this thing. a section ends, the next one begins, and it's not even clear what's under discussion.

One section starts "The clearest public descriptions landed between mid-2025 and early 2026." Descriptions of what? No clarity on this. Probably because it got "tersed" out.

At this point I feel like blogs are like lawn ornaments for startups. Even now, the sheer contempt for other people's time and attention is still a mild shock to me.

guard402 2026-03-16 04:57 UTC link
We tested this systematically and the results are more nuanced than you might expect.

We built a hotel listing page with a display:none injection ($189 listing with a hidden override to book $4,200) and tested six DOM extraction APIs via Chrome CDP. The split: innerText, Chrome Accessibility Tree, and Playwright's ARIA snapshot all filter it. textContent, innerHTML, and direct querySelector don't.

Then we audited the source code of all four major browser MCP tools: chrome-devtools-mcp (Google), playwright-mcp (Microsoft), chrome-cdp-skill, and puppeteer-mcp. Every single one defaults to a safe extraction method — accessibility tree or innerText. That's the good news.

The bad news: three out of four expose evaluate_script or eval commands that let the agent run arbitrary JS in the page context. When the accessibility tree doesn't return enough text (it often only gives headings and buttons), the agent's natural next step is textContent or innerHTML via eval. This is even shown as an example in the chrome-devtools-mcp docs.

Also: display:none is just the simplest technique. We tested opacity:0, font-size:0, and position:absolute left:-9999px — all three bypass even the safe defaults because the elements are technically "rendered" and accessible to screen readers. A determined attacker who knows you're using the accessibility tree can trivially switch to opacity-based hiding.

rocho 2026-03-15 18:13 UTC link
I absolutely agree, although even that doesn't solve the root problem. The underlying LLM architecture is fundamentally insecure as it doesn't separate between instructions and pure content to read/operate on.

I wonder if it'd be possible to train an LLM with such architecture: one input for the instructions/conversation and one "data-only" input. Training would ensure that the latter isn't interpreted as instructions, although I'm not knowledgeable enough to understand if that's even theoretically possible: even if the inputs are initially separate, they eventually mix in the neural network. However, I imagine that training could be done with massive amounts of prompt injections in the "data-only" input to penalize execution of those instructions.

indigodaddy 2026-03-15 18:15 UTC link
So this is like a claw type thing? I’ve never used these “agents”. Not sure what I would do with them. Probably not for coding right?
everlier 2026-03-16 05:04 UTC link
Thank you for the feedback! It's very early days of the project, there's indeed a lot to improve in this aspect.

OpenGuard is an OpenAI/Anthropic-compatible LLM proxy with middleware-style configuration for protocol-level inspections of the traffic that goes through it. Right now it has a small set of guards that is being actively expanded.

everlier 2026-03-16 05:20 UTC link
Thank you for the feedback!

I actually assure you that no deep research from any of the provider was used to create the article itself, but I used a custom-built research pipeline for creating a dossier on promt injections as a starting point.

The article was intended as an overview of prompt injections with my prediction what will happen next in this space, which is a soft justification why the tools like OpenGuard are needed. I've spent multiple days iterating on the prose without an ill intent, mostly aiming to make it dense and informative to avoid wasting people's time, which I see backfired here.

I'm deeply sorry that it left such a bad taste despite my best effort, there's still a lot to learn for me.

Editorial Channel
What the content says
+0.60
Article 19 Freedom of Expression
High Framing Advocacy
Editorial
+0.60
SETL
+0.39

Content extensively advocates for transparency, disclosure, and informed decision-making in agent-system design. Emphasizes the right to receive and seek information about security risks and system behavior. Frames prompt-injection disclosure as essential to user understanding.

+0.55
Article 3 Life, Liberty, Security
High Framing Advocacy
Editorial
+0.55
SETL
+0.37

Content advocates for system design that preserves user security and autonomy in agent-driven workflows. Discusses how architectural decisions impact user safety.

+0.50
Article 2 Non-Discrimination
Medium Framing
Editorial
+0.50
SETL
+0.35

Content emphasizes dignity through trustworthiness and system integrity. Describes how agents should reliably serve user intent without corruption.

+0.50
Article 26 Education
High Framing Advocacy
Editorial
+0.50
SETL
+0.27

Content advocates for education and literacy regarding agent security, prompt injection, and system design principles. Frames technical understanding as essential to user empowerment and informed decision-making.

+0.50
Article 30 No Destruction of Rights
Medium Framing Advocacy
Editorial
+0.50
SETL
+0.32

Content defends the right to security and trustworthiness in agent systems against misinterpretation. Advocates that prompt-injection defense is not a violation of freedom but a prerequisite for it.

+0.45
Preamble Preamble
Medium Framing
Editorial
+0.45
SETL
+0.26

Content frames prompt injection as a systemic security problem that threatens human agency, autonomy, and the integrity of digital systems. Emphasizes shared responsibility for building trustworthy systems.

+0.45
Article 27 Cultural Participation
Medium Framing Advocacy
Editorial
+0.45
SETL
+0.26

Content advocates for participation in the cultural and technical commons of agent-system design. Emphasizes shared responsibility and collective standards-setting. Frames prompt-injection defense as a community practice.

+0.40
Article 9 No Arbitrary Detention
Medium Framing
Editorial
+0.40
SETL
+0.28

Content frames prompt injection as an arbitrary action—attackers cause agents to act contrary to user intent without authorization. Emphasizes threat to freedom from arbitrary interference.

+0.40
Article 20 Assembly & Association
Medium Framing Advocacy
Editorial
+0.40
SETL
+0.20

Content advocates for collective action and industry-wide standards on prompt injection. References multi-vendor efforts (OpenAI, Anthropic, Google, Microsoft) and standards bodies (MCP, A2A). Frames prompt injection as a shared problem requiring coordinated defense.

+0.40
Article 28 Social & International Order
Medium Framing
Editorial
+0.40
SETL
+0.24

Content frames prompt-injection defense as essential to maintaining social and international order based on human rights protections. Advocates for systemic, architectural approaches to prevent harm at scale.

+0.35
Article 1 Freedom, Equality, Brotherhood
Medium Framing
Editorial
+0.35
SETL
+0.23

Content discusses prompt injection as a threat to equal protection and non-discrimination in agent systems. Acknowledges that attack success rates vary, implying differential vulnerability.

+0.35
Article 21 Political Participation
Medium Framing
Editorial
+0.35
SETL
+0.23

Content frames access to secure, trustworthy systems as a public concern. Advocates for builders to adopt defensive practices, implying that agent-system security is a matter of public interest.

+0.35
Article 25 Standard of Living
Medium Framing
Editorial
+0.35
SETL
+0.19

Content frames prompt-injection defense as essential to user security and welfare in digital systems. Discusses how agent-system compromise can cause financial, data, and operational harm.

+0.35
Article 29 Duties to Community
Medium Framing
Editorial
+0.35
SETL
+0.23

Content frames builder and user responsibilities in agent-system design. Emphasizes that freedom from prompt-injection is balanced against security constraints; advocates for proportionate controls.

+0.30
Article 13 Freedom of Movement
Low Framing
Editorial
+0.30
SETL
+0.12

Content does not directly address freedom of movement, but the discussion of outbound connection limits and link-safety controls relates tangentially to agent mobility.

+0.25
Article 12 Privacy
Medium Framing
Editorial
+0.25
SETL
+0.11

Content discusses privacy threats from prompt injection: data leaks, unauthorized file reads, memory poisoning that persists across sessions. Frames privacy as a security concern in agent systems.

ND
Article 4 No Slavery

No observable engagement with slavery, servitude, or forced labor.

ND
Article 5 No Torture

No observable engagement with torture or cruel treatment.

ND
Article 6 Legal Personhood

No observable engagement with personhood or legal recognition.

ND
Article 7 Equality Before Law

No observable engagement with equal protection under law in legal/jurisdictional sense.

ND
Article 8 Right to Remedy

No observable engagement with remedies for violations.

ND
Article 10 Fair Hearing

No observable engagement with fair and public hearing or due process in judicial context.

ND
Article 11 Presumption of Innocence

No observable engagement with criminal prosecution or legal innocence presumption.

ND
Article 14 Asylum

No observable engagement with asylum or refuge.

ND
Article 15 Nationality

No observable engagement with nationality or state membership.

ND
Article 16 Marriage & Family

No observable engagement with marriage, family, or property rights.

ND
Article 17 Property

No observable engagement with property rights in traditional sense.

ND
Article 18 Freedom of Thought

No observable engagement with freedom of thought, conscience, or religion.

ND
Article 22 Social Security

No observable engagement with social security, cultural participation, or economic welfare.

ND
Article 23 Work & Equal Pay

No observable engagement with work, employment, or fair wages.

ND
Article 24 Rest & Leisure

No observable engagement with rest, leisure, or time.

Structural Channel
What the site does
Element Modifier Affects Note
Legal & Terms
Privacy
No privacy policy or data handling disclosure visible on provided content.
Terms of Service
No Terms of Service visible on provided content.
Identity & Mission
Mission +0.15
Article 3 Article 19 Article 27
OpenGuard appears focused on agent security and prompt-injection defense, supporting secure digital infrastructure and informed decision-making.
Editorial Code
No explicit editorial guidelines or corrections policy visible.
Ownership
Published by Jitera Labs (publisher field); OpenGuard Team (author). Commercial entity; no conflict apparent.
Access & Distribution
Access Model +0.10
Article 19 Article 26
Content appears freely accessible; no paywall or registration barrier observed in provided markup.
Ad/Tracking
No visible ad tags or tracking pixels in provided HTML; CDN font loading present.
Accessibility
Semantic HTML structure present; color contrast adequate for dark theme; no ARIA labels visible in provided markup.
br_tracking +0.05
Preamble ¶5 Article 12 Article 19
No third-party trackers detected
br_security -0.05
Article 3 Article 12
Security headers: HTTPS
br_accessibility 0.00
Article 26 Article 27 ¶1
Accessibility: lang attr
br_consent 0.00
Article 12 Article 19 Article 20 ¶2
No cookie consent banner detected
+0.35
Article 19 Freedom of Expression
High Framing Advocacy
Structural
+0.35
Context Modifier
+0.25
SETL
+0.39

Blog content is freely accessible, published under author attribution, and provides detailed technical information without paywalls or access restrictions.

+0.35
Article 26 Education
High Framing Advocacy
Structural
+0.35
Context Modifier
+0.10
SETL
+0.27

Blog post itself functions as educational material; freely accessible, detailed technical content provided without paywalls.

+0.30
Preamble Preamble
Medium Framing
Structural
+0.30
Context Modifier
0.00
SETL
+0.26

Clear, accessible blog format with navigation; no paywalls or access restrictions observed.

+0.30
Article 3 Life, Liberty, Security
High Framing Advocacy
Structural
+0.30
Context Modifier
+0.15
SETL
+0.37

Content advocates for security practices without restricting access or participation.

+0.30
Article 20 Assembly & Association
Medium Framing Advocacy
Structural
+0.30
Context Modifier
0.00
SETL
+0.20

Content is published as part of an open technical community; no restrictions on collective participation or assembly observable.

+0.30
Article 27 Cultural Participation
Medium Framing Advocacy
Structural
+0.30
Context Modifier
+0.15
SETL
+0.26

Blog format facilitates community knowledge-sharing; references public standards (MCP, A2A) and open-source practices.

+0.30
Article 30 No Destruction of Rights
Medium Framing Advocacy
Structural
+0.30
Context Modifier
0.00
SETL
+0.32

Content itself exemplifies non-restriction of rights; freely published technical analysis.

+0.25
Article 2 Non-Discrimination
Medium Framing
Structural
+0.25
Context Modifier
0.00
SETL
+0.35

Blog structure does not restrict or elevate any user group; content is equally accessible.

+0.25
Article 13 Freedom of Movement
Low Framing
Structural
+0.25
Context Modifier
0.00
SETL
+0.12

No observable restrictions on user movement or navigation on the website.

+0.25
Article 25 Standard of Living
Medium Framing
Structural
+0.25
Context Modifier
0.00
SETL
+0.19

No observable harm or restriction to user welfare on the website.

+0.25
Article 28 Social & International Order
Medium Framing
Structural
+0.25
Context Modifier
0.00
SETL
+0.24

Content supports shared standards and international vendor coordination; no restrictions on order or stability observable.

+0.20
Article 1 Freedom, Equality, Brotherhood
Medium Framing
Structural
+0.20
Context Modifier
0.00
SETL
+0.23

No differential access or content restriction by user status observed.

+0.20
Article 9 No Arbitrary Detention
Medium Framing
Structural
+0.20
Context Modifier
0.00
SETL
+0.28

Blog format is transparent and non-arbitrary in structure.

+0.20
Article 12 Privacy
Medium Framing
Structural
+0.20
Context Modifier
0.00
SETL
+0.11

Blog structure does not intrude on user privacy; no excessive data collection observable.

+0.20
Article 21 Political Participation
Medium Framing
Structural
+0.20
Context Modifier
0.00
SETL
+0.23

No observable participation or governance structures on the website itself.

+0.20
Article 29 Duties to Community
Medium Framing
Structural
+0.20
Context Modifier
0.00
SETL
+0.23

Blog structure does not restrict user freedoms; educational content is freely available.

ND
Article 4 No Slavery

No structural signals related to Article 4.

ND
Article 5 No Torture

No structural signals related to Article 5.

ND
Article 6 Legal Personhood

No structural signals related to Article 6.

ND
Article 7 Equality Before Law

No structural signals related to Article 7.

ND
Article 8 Right to Remedy

No structural signals related to Article 8.

ND
Article 10 Fair Hearing

No observable engagement with fair and public hearing or due process in judicial context.

ND
Article 11 Presumption of Innocence

No structural signals related to Article 11.

ND
Article 14 Asylum

No structural signals related to Article 14.

ND
Article 15 Nationality

No structural signals related to Article 15.

ND
Article 16 Marriage & Family

No structural signals related to Article 16.

ND
Article 17 Property

No structural signals related to Article 17.

ND
Article 18 Freedom of Thought

No structural signals related to Article 18.

ND
Article 22 Social Security

No structural signals related to Article 22.

ND
Article 23 Work & Equal Pay

No structural signals related to Article 23.

ND
Article 24 Rest & Leisure

No structural signals related to Article 24.

Supplementary Signals
How this content communicates, beyond directional lean. Learn more
Epistemic Quality
How well-sourced and evidence-based is this content?
0.82 medium claims
Sources
0.8
Evidence
0.8
Uncertainty
0.8
Purpose
0.9
Propaganda Flags
2 manipulative rhetoric techniques found
2 techniques detected
appeal to fear
The headline 'The Webpage Has Instructions. The Agent Has Your Credentials' and the phrase 'The first major prompt-injection incident with real financial damage will probably involve a multi-agent workflow' invoke fear of system compromise and loss of control.
causal oversimplification
The claim that 'That incident...will do for agent security what the 2013 Target breach did for network segmentation' oversimplifies the relationship between a single incident and broad industry change.
Emotional Tone
Emotional character: positive/negative, intensity, authority
urgent
Valence
-0.3
Arousal
0.7
Dominance
0.6
Transparency
Does the content identify its author and disclose interests?
0.50
✓ Author ✗ Conflicts ✗ Funding
More signals: context, framing & audience
Solution Orientation
Does this content offer solutions or only describe problems?
0.65 mixed
Reader Agency
0.8
Stakeholder Voice
Whose perspectives are represented in this content?
0.55 5 perspectives
Speaks: institutioncorporation
About: individualscorporationgovernment
Temporal Framing
Is this content looking backward, at the present, or forward?
mixed short term
Geographic Scope
What geographic area does this content cover?
global
United States
Complexity
How accessible is this content to a general audience?
technical high jargon domain specific
Longitudinal 214 HN snapshots · 17 evals
+1 0 −1 HN
Audit Trail 37 entries
2026-03-16 01:54 ap_publish AP publish failed: 401 - -
2026-03-16 01:51 ap_publish AP publish failed: 401 - -
2026-03-16 01:49 ap_publish AP publish failed: 401 - -
2026-03-16 01:46 ap_publish AP publish failed: 401 - -
2026-03-16 01:44 ap_publish AP publish failed: 401 - -
2026-03-16 01:41 ap_publish AP publish failed: 401 - -
2026-03-16 01:39 ap_publish AP publish failed: 401 - -
2026-03-16 01:36 ap_publish AP publish failed: 401 - -
2026-03-16 01:33 ap_publish AP publish failed: 401 - -
2026-03-16 01:31 ap_publish AP publish failed: 401 - -
2026-03-16 01:29 ap_publish AP publish failed: 401 - -
2026-03-16 01:26 ap_publish AP publish failed: 401 - -
2026-03-16 01:24 ap_publish AP publish failed: 401 - -
2026-03-16 01:21 ap_publish AP publish failed: 401 - -
2026-03-16 01:19 ap_publish AP publish failed: 401 - -
2026-03-16 01:16 ap_publish AP publish failed: 401 - -
2026-03-16 01:14 ap_publish AP publish failed: 401 - -
2026-03-16 01:12 ap_publish AP publish failed: 401 - -
2026-03-16 01:09 ap_publish AP publish failed: 401 - -
2026-03-16 01:06 ap_publish AP publish failed: 401 - -
2026-03-16 00:35 eval Evaluated by llama-4-scout-wai-psq: +0.44 (Moderate positive) 0.00
2026-03-16 00:20 eval Evaluated by llama-3.3-70b-wai-psq: +0.01 (Neutral)
2026-03-16 00:17 eval Evaluated by llama-3.3-70b-wai: 0.00 (Neutral)
reasoning
Technical blog post on security threat
2026-03-15 23:59 eval Evaluated by llama-4-scout-wai: 0.00 (Neutral) 0.00
reasoning
Technical blog post on prompt injection attacks in AI agents, no explicit human rights discussion.
2026-03-15 22:46 eval Evaluated by claude-haiku-4-5-20251001: +0.42 (Moderate positive) 18,125 tokens
2026-03-15 21:37 eval Evaluated by llama-4-scout-wai-psq: +0.44 (Moderate positive) 0.00
2026-03-15 21:32 eval Evaluated by llama-4-scout-wai: 0.00 (Neutral) 0.00
reasoning
Technical blog post on prompt injection attacks in AI agents, no explicit human rights discussion.
2026-03-15 20:55 eval Evaluated by llama-4-scout-wai-psq: +0.44 (Moderate positive) 0.00
2026-03-15 20:52 eval Evaluated by llama-4-scout-wai: 0.00 (Neutral) 0.00
reasoning
Technical blog post on prompt injection attacks in AI agents, no explicit human rights discussion.
2026-03-15 20:18 eval Evaluated by llama-4-scout-wai-psq: +0.44 (Moderate positive) 0.00
2026-03-15 20:16 eval Evaluated by llama-4-scout-wai: 0.00 (Neutral) 0.00
reasoning
Technical blog post on prompt injection attacks in AI agents, no explicit human rights discussion.
2026-03-15 19:43 eval Evaluated by llama-4-scout-wai-psq: +0.44 (Moderate positive) 0.00
2026-03-15 19:41 eval Evaluated by llama-4-scout-wai: 0.00 (Neutral) 0.00
reasoning
Technical blog post on prompt injection attacks in AI agents, no explicit human rights discussion.
2026-03-15 19:05 eval Evaluated by llama-4-scout-wai-psq: +0.44 (Moderate positive) 0.00
2026-03-15 19:03 eval Evaluated by llama-4-scout-wai: 0.00 (Neutral) 0.00
reasoning
Technical blog post on prompt injection attacks in AI agents, no explicit human rights discussion.
2026-03-15 18:16 eval Evaluated by llama-4-scout-wai-psq: +0.44 (Moderate positive)
2026-03-15 18:15 eval Evaluated by llama-4-scout-wai: 0.00 (Neutral)
reasoning
Technical blog post on prompt injection attacks in AI agents, no explicit human rights discussion.