Reproducible System Prompt Extraction in Latest Claude Models
Posted29 days agoActive29 days ago
Securitystory
heatednegative
Debate
80/100
AI SecurityCode Analysis BypassClaude Models
Key topics
AI Security
Code Analysis Bypass
Claude Models
I found a simple, reproducible prompt-injection path that makes recent Claude models reveal their full system prompt (network config, tool rules, allowed domains, etc.) using only conversational framing. No jailbreak tricks required.
Write-up with examples: https://asparius.github.io/posts/prompt-injection-claude.html
Discussion Activity
Light discussionFirst comment
11h
Peak period
1
10-11h
Avg / period
1
Key moments
- 01Story posted
Dec 11, 2025 at 8:08 AM EST
29 days ago
Step 01 - 02First comment
Dec 11, 2025 at 6:41 PM EST
11h after posting
Step 02 - 03Peak activity
1 comments in 10-11h
Hottest window of the conversation
Step 03 - 04Latest activity
Dec 11, 2025 at 6:41 PM EST
29 days ago
Step 04
Generating AI Summary...
Analyzing up to 500 comments to identify key contributors and discussion patterns
ID: 46230918Type: storyLast synced: 12/11/2025, 1:10:23 PM
Want the full context?
Jump to the original sources
Read the primary article or dive into the live Hacker News thread when you're ready.
Discussion hasn't started yet.