Request assembly / context selection — attack surface (summary)

Summary diagram of a request-assembly boundary: user input flows into a context pool, a context selector, and a final assembled request before reaching the LLM core and tool routing; callouts highlight instruction injection, memory poisoning, truncation dropping constraints, provenance loss, and precedence confusion.
Request assembly / context selection as an attack surface — summary schematic.

Overview

A generic reference model for the request-assembly boundary (context aggregation → selection/ranking → truncation) that precedes an LLM call.

Text alternative (long description)

Scope and limitations