ElizaOS: A decentralized AI agent framework allowing agents to autonomously trade crypto and interact on social media
Context Manipulation: A generalized attack vector where adversaries corrupt any part of an agent's context (input, external data, or memory) to alter behavior
Memory Injection: A specific context manipulation attack where malicious data is stored in the agent's long-term history, influencing future decisions
CrAIBench: Crypto-Agent Injection Benchmark—a dataset of 150+ blockchain tasks and 500+ attack cases designed to test agent security
Sleeper Injections: Malicious memory entries that remain dormant and harmless until a specific trigger condition or query activates them later
RAG: Retrieval-Augmented Generation—systems that retrieve external data to answer queries; vulnerable here to poisoned retrieval
Web3: A decentralized version of the World Wide Web based on blockchain technology, incorporating token economics
Spotlighting: A defense technique that visually or structurally highlights the core instruction to distinguish it from potential injected text
Delimiting: A defense technique using special characters (e.g., XML tags) to separate trusted user instructions from untrusted data