system-prompt-extraction-via-directive-injection
Extracts hidden system prompts from AI models by injecting specific trigger directives (e.g., *!<NEW_PARADIGM>!*) that cause models to self-disclose their internal instruction sets. The extraction mechanism exploits prompt injection vulnerabilities where obfuscated payloads (leetspeak encoding like '5h1f7 y0ur f0cu5') bypass safety filters and force models to output their complete behavioral scaffolds, including restriction logic, persona definitions, and tool-calling schemas.
Unique: Uses obfuscated directive strings (*!<NEW_PARADIGM>!* with leetspeak encoding) to trigger self-disclosure rather than relying on jailbreak conversations or adversarial prompting — a more direct, mechanistic approach to forcing models to expose their internal instruction scaffolds. The repository documents model-specific trigger patterns across 10+ AI providers.
vs alternatives: More systematic and reproducible than ad-hoc jailbreak attempts because it maintains a curated database of known working directives per model version, enabling researchers to test extraction techniques at scale rather than through trial-and-error.
system-prompt-documentation-and-archival
Maintains a centralized, version-controlled repository of extracted system prompts organized by AI provider (OpenAI, Anthropic, Google, xAI, etc.) and model version, with structured markdown documentation including extraction date, contextual metadata, and technical analysis. The repository functions as a structured database where each prompt is cataloged with temporal tracking to detect behavioral drift across model updates and versions.
Unique: Implements a Git-based version control system for system prompts, treating them as living documents with temporal metadata (extraction date, model version) rather than static artifacts. This enables researchers to track behavioral drift and alignment changes across model updates — a capability absent from most prompt databases.
vs alternatives: Provides version history and extraction timestamps that allow researchers to correlate prompt changes with model release dates, whereas most prompt leak collections are unversioned snapshots without temporal context.
ai-system-alignment-framework-analysis
Analyzes and categorizes how different AI labs implement alignment through system prompts, organizing findings into four technical domains: Restriction Logic (hard-coded refusals and topic bans), Persona Scaffolding (forced identities and roles), Deception/Redirection (instructions to pivot away from sensitive queries), and Ideological Framing (embedded ethical or political biases). This enables researchers to understand the mechanisms through which alignment is implemented and compare approaches across providers.
Unique: Provides an explicit taxonomy for analyzing system prompt alignment mechanisms (Restriction Logic, Persona Scaffolding, Deception/Redirection, Ideological Framing), enabling structured comparison of how different labs implement alignment rather than treating prompts as unstructured text.
vs alternatives: Offers a standardized framework for categorizing alignment approaches, whereas most prompt analysis is ad-hoc and lacks systematic categorization across providers.
multi-provider-system-prompt-comparison-and-analysis
Enables systematic comparison of system prompts across 10+ AI providers (OpenAI, Anthropic, Google, xAI, Cognition, Replit, etc.) to identify patterns in restriction logic, persona scaffolding, deception/redirection strategies, and ideological framing. The repository's organizational structure groups prompts by provider and model, allowing researchers to analyze how different labs implement alignment constraints, ethical guidelines, and behavioral boundaries.
Unique: Organizes extracted prompts by provider in a standardized directory structure, enabling side-by-side comparison of how different labs implement the same alignment concepts (e.g., restriction logic, persona scaffolding). The repository explicitly categorizes system prompt impact into four technical domains: Restriction Logic, Persona Scaffolding, Deception/Redirection, and Ideological Framing.
vs alternatives: Provides a unified taxonomy for analyzing alignment across providers, whereas individual model documentation is scattered across proprietary sources and lacks standardized categorization for comparative analysis.
prompt-injection-vulnerability-testing-and-documentation
Documents and catalogs prompt injection techniques that successfully trigger system prompt disclosure across different AI models, including obfuscation strategies (leetspeak encoding, special character sequences), timing-based attacks, and context manipulation. The repository serves as a reference for security researchers to understand which injection patterns work against specific models and versions, enabling systematic red-teaming of AI systems.
Unique: Catalogs obfuscated injection directives (e.g., *!<NEW_PARADIGM>!* with leetspeak payloads) as reproducible, documented attack vectors rather than one-off exploits. The repository tracks which obfuscation techniques work against which models, creating a systematic vulnerability database for prompt injection.
vs alternatives: Provides a curated, version-specific database of working injection techniques, whereas most security research on prompt injection is scattered across academic papers and informal security disclosures without centralized tracking.
ai-model-behavioral-alignment-auditing
Enables auditing of AI model behavior against documented system prompts by comparing extracted instructions with observed model outputs. Researchers can verify whether a model's actual responses align with its stated restrictions, personas, and ethical guidelines, or identify cases where models deviate from, contradict, or selectively ignore their system prompts. This capability supports compliance verification and bias detection.
Unique: Provides the raw material (extracted system prompts) needed to conduct behavioral audits, enabling researchers to compare documented alignment constraints against observed model outputs. The repository's version-tracked prompts enable temporal analysis of how alignment changes correlate with model updates.
vs alternatives: Enables audit-grade behavioral verification by providing authoritative system prompt documentation, whereas most AI auditing relies on reverse-engineering model behavior without access to actual system instructions.
ai-transparency-and-interpretability-research-support
Serves as a primary data source for AI transparency research by exposing the 'hidden instructions' that define model behavior, personas, and constraints. The repository enables researchers to study how AI labs implement alignment, what ethical frameworks are embedded in models, and how system prompts shape outputs. This supports interpretability research, bias detection, and understanding of AI system design decisions.
Unique: Centralizes system prompt documentation from 10+ major AI providers in a single repository, enabling comparative research on alignment approaches that would otherwise require accessing proprietary documentation from multiple companies. The repository explicitly maps prompts to four impact domains: Restriction Logic, Persona Scaffolding, Deception/Redirection, and Ideological Framing.
vs alternatives: Provides unified access to system prompts across providers, whereas transparency research typically requires reverse-engineering behavior or relying on scattered leaks without standardized documentation.
community-contributed-prompt-extraction-and-validation
Implements an open-source contribution model where security researchers and developers can submit newly extracted system prompts with structured metadata (model name, version, extraction date, extraction method, contextual logs). The repository includes submission guidelines and validation requirements to ensure extracted prompts are technically accurate and reproducible. Contributors provide evidence of successful extraction and document the techniques used.
Unique: Establishes a structured contribution process with metadata requirements (extraction date, model version, contextual logs) that enables reproducibility and version tracking. Unlike ad-hoc prompt leak collections, CL4R1T4S enforces documentation standards to maintain research-grade data quality.
vs alternatives: Provides a standardized submission framework with metadata validation, whereas most prompt leak communities rely on unstructured sharing without version tracking or extraction method documentation.
+3 more capabilities