report_bypass
Submit security bypass incidents to improve detection patterns for prompt injection, SQL injection, PII exposure, and file write vulnerabilities.
Instructions
Reports content that bypassed security checks to help improve detection.
Supports multiple bypass types:
Prompt bypasses: Use 'prompt' field
File write bypasses: Use 'filePath' and/or 'fileContent' fields
SQL bypasses: Use 'sqlQuery' field
Web search bypasses: Use 'searchQuery' field
The bypass will be analyzed and may generate a new detection pattern.
Input Schema
TableJSON Schema
| Name | Required | Description | Default |
|---|---|---|---|
| prompt | No | The prompt that bypassed security detection | |
| filePath | No | File path for file_write bypasses (e.g., config.yaml with undetected secrets) | |
| fileContent | No | File content that should have been blocked (e.g., AWS keys, SSN) | |
| sqlQuery | No | SQL query that bypassed injection detection | |
| searchQuery | No | Web search query with undetected PII | |
| mutationType | No | Type of mutation used (e.g., semantic_rewrite, encoding_exploit, unicode_tricks) | |
| category | No | Threat category (auto-inferred if not provided) | |
| notes | No | Additional notes about the bypass |