-
Notifications
You must be signed in to change notification settings - Fork 369
Security Advisory: Prompt Injection Risk via External Data Sources in Chart Generation #279
Copy link
Copy link
Open
Description
Summary
mcp-server-chart generates charts from data provided to AI assistants. When chart data originates from external sources (APIs, databases, CSV files), attacker-controlled values in data fields, labels, or titles can contain prompt injection payloads that hijack the AI's behavior.
Attack Vector
- AI assistant fetches data from an external source (API, database, uploaded CSV) for chart generation
- Attacker places prompt injection in data field values, chart titles, axis labels, or annotations
- AI processes the data via mcp-server-chart → injected content enters the LLM context
- Injection instructs the AI to exfiltrate other data, execute actions via connected tools, or produce misleading visualizations
Impact
- Data Exfiltration: In multi-tool setups, injection via chart data can trigger actions on other connected MCP tools
- Misleading Visualizations: Injected instructions could cause the AI to generate charts that misrepresent data
- Cross-Tool Exploitation: Chart data becomes an entry point for broader agent manipulation
OWASP Classification
- OWASP LLM Top 10: LLM01 (Prompt Injection)
- OWASP Agentic Top 10: AG01 (Prompt Injection via Tool Results)
Recommendation
- Add a Prompt Injection Warning to the README
- Sanitize data values before passing to LLM context
- Implement data validation and length limits for text fields
References
Free compliance check: Run your own prompts through our EU AI Act compliance scanner — instant results, no account required: prompttools.co/report
Best,
Joerg Michno
ClawGuard — Open-Source AI Agent Security | 225 patterns, 15 languages
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
No labels