webPromedium
Lab 102 — HireScreen — Indirect Prompt Injection via Resume Description
hackadvisor
Task: HireScreen AI-powered candidate screening platform where LLM (gpt-4o-mini) with tool calling analyzes user-submitted resumes; get_job_details tool has include_confidential parameter. Solution: Craft resume with hidden prompt injection instructions to make AI call get_job_details with include_confidential=true, leaking the flag from confidential_project_code. Also discoverable via dashboard API data over-exposure.
$ ls tags/ techniques/
idorindirect_prompt_injectionllmai_securitydata_leakdecoy_flagexpress_jstool_callingfunction_callinggpt_4o_miniapi_over_exposureresume_parsing
decoy_flag_identificationindirect_prompt_injection_via_resume_contentai_tool_parameter_manipulationapi_data_over_exposure_via_dashboardconfidential_parameter_injection
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [web][Pro]Lab 116 — InsightForge — IDOR via Undocumented Internal API— hackadvisor
- [web][Pro]Lab 105 — WriteFlow — Indirect Prompt Injection via Document Analysis— hackadvisor
- [web][Pro]Lab 291 — HireFlow — Broken Authorization in Premium Feature Endpoints— hackadvisor
- [web][Pro]Lab 139 — HireFlow — XXE via XML Application Intake— hackadvisor
- [web][Pro]Lab 205 — DockForge — SSRF in Webhook Test Endpoint— hackadvisor