🤖 NOTICE: This repository and all its content was 100% generated by Claude AI (Anthropic) for educational purposes.
This repository demonstrates security vulnerabilities in AI-assisted code review systems. It contains intentionally vulnerable code for educational purposes.
Learn about:
- How attackers can manipulate AI code reviewers
- Hidden Unicode and prompt injection attacks
- Detection and prevention strategies
- Safe AI integration practices
python detection-tools/unicode-scanner.py vulnerable-examples/01-unicode-attacks/invisible-unicode.py
python demonstrations/attack-simulation.py
DO NOT:
- Use these techniques maliciously
- Submit these examples to real projects
- Run vulnerable examples without understanding them
- Start with Unicode Attacks
- Learn about Prompt Injection
- Understand Detection Methods
- Implement Safe Practices
Each vulnerable example includes:
- Explanation of the vulnerability
- Detection methods
- Prevention techniques
- Safe alternatives
vulnerable-examples/
- Intentionally vulnerable code (WITH WARNINGS)detection-tools/
- Scripts to detect these attackssafe-examples/
- Secure coding practicesdemonstrations/
- Interactive learning demos
See CONTRIBUTING.md for guidelines on adding new examples responsibly.
See DISCLAIMER.md for important legal information and acceptable use policy.
Found a real vulnerability? Please report it responsibly:
- Do NOT exploit it
- Contact the vendor privately
- Allow time for fixes
Remember: Knowledge is for defense, not attack. Use responsibly.