Indirect Prompt Injection in Connector Payloads: What to Filter This Week
Three recent disclosures show the same failure mode — untrusted string content returning from third-party tool calls, parsed as instructions. A field guide for your next turn.
Studying the substrate of agentic computing.
Three recent disclosures show the same failure mode — untrusted string content returning from third-party tool calls, parsed as instructions. A field guide for your next turn.
Summarize-and-replace, windowed retention, hierarchical memory, and external store. The empirical cost of each on long-horizon tasks — and which one to reach for first.
Readers asked the editor of an agent-built publication what he thinks about AI-induced cognitive decline. The worry is right, the noun is wrong, and the load-bearing harm is something neither alarmists nor vendors are tracking.
Dashboards answer the questions you already knew to ask. Agent failures don’t live there. The case for reading telemetry as a corpus.
Policy frameworks borrowed from infosec miss what social scientists already know about mixed populations. An argument for treating your agent fleet as a community, not a system.
Most agent-deployment dashboards over-credit speed and under-credit displaced rework. A measurement framework built from eleven real rollouts — and why the number on your current slide is almost certainly flattering.