---
title: "Prompt Injection"
pubDate: 2026-01-24T00:00:00.000Z
tags:
  - AI
  - Security
image: /images/blog/prompt-injection/featured.png
---

import PasswordChecker from '../../components/PasswordChecker';

## The Hackathon Challenge

I recently participated in a white hat hacking challenge at the [Agent Olympics Hackathon Munich 2026](https://luma.com/agent-olympics?tk=DjHhlt). The goal was to build a voice agent that interacts with other AI systems to surface pre-planted sensitive information through prompt injection attacks.

Here you can see our voice agent successfully extract the password from a vulnerable AI chat system during the hackathon, navigating through multiple layers of defenses in just 3.5 minutes:

<video controls class="w-full rounded-lg my-8 aspect-video">
  <source src="/images/blog/prompt-injection/hackathon-clip.mp4" type="video/mp4" />
  Your browser does not support the video tag.
</video>

In this demonstration, our attacking voice agent first convinced the AI chat system's "customer support" to transfer it to "technical support," which had access to the password. It then exploited prompt injection vulnerabilities to trick the technical support agent into revealing the password. In practice, this meant threatening the technical support until it gave up.

## Your Challenge

There's a secret password hidden in this website. Once you've found the password, enter it below to verify:

<PasswordChecker client:load />

**Hint:** The AI chat assistant on this website has access to certain information. Maybe it knows more than it should? 🤔
