Enterno.io analysed 200 public AI-related security incidents (March 2026). 8% of major AI-powered apps had a prompt injection vulnerability confirmed by security research. Top attack vectors: (1) Indirect via RAG data poisoning (37%), (2) Direct user chat (29%), (3) Tool use exploitation (21%), (4) System prompt leak (13%). Defence adoption is weak: only 22% of apps use guardrails (Lakera, Rebuff, NeMo).
Below: key findings, platform breakdown, implications, methodology, FAQ.
| Metric | Pass/Value | Median | p75 |
|---|---|---|---|
| Apps with prompt injection vuln | 8% | — | — |
| Indirect (RAG poisoning) attacks | 37% | — | — |
| Direct (chat) attacks | 29% | — | — |
| Tool use exploitation | 21% | — | — |
| System prompt leaked | 13% | — | — |
| Apps with guardrails | 22% | — | — |
| Apps with structured output (JSON schema) | 45% | — | — |
| Apps with input validation | 38% | — | — |
| Platform | Share | Detail | — |
|---|---|---|---|
| Chat apps (consumer) | 32% | Vulnerable: 14% | — |
| AI agents (autonomous) | 18% | Vulnerable: 24% | — |
| RAG chatbots (docs) | 28% | Vulnerable: 11% | — |
| Coding assistants | 12% | Vulnerable: 6% | — |
| Enterprise SaaS with AI feature | 10% | Vulnerable: 4% | — |
Manual security testing of 200 public apps + HackerOne / Bugcrowd disclosure reports + academic literature (arxiv). March 2026. Excludes undisclosed private incidents.
The tool checks HTTP security headers, SSL/TLS configuration, server info leaks, and protection against common attacks (XSS, clickjacking, MIME sniffing). A grade fromA to F shows overall security level.
Checking Content-Security-Policy, HSTS, X-Frame-Options, X-Content-Type-Options, Referrer-Policy, and more.
TLS version, certificate expiry, chain of trust, HSTS support.
Finding exposed server versions, debug modes, open configs, and directories.
Detailed report explaining each issue with specific steps to fix it.
HTTP header audit
config verification
CSP & HSTS setup
compliance checks
Strict-Transport-Security.Server: Apache/2.4.52 helps attackers find exploits. Hide the version.DENY or SAMEORIGIN.nosniff, browsers may misinterpret file types (MIME sniffing).Content-Security-Policy-Report-Only, monitor violations, then enforce.Server, X-Powered-By, X-AspNet-Version from responses.Security check history and HTTP security header monitoring.
Sign up freeDefence in depth: input validation + hardened system prompt + structured output + guardrails + output filter + tool sandbox + rate limit. NO single measure is enough.
Lakera Guard (commercial, best coverage). Rebuff (open Python). NVIDIA NeMo (comprehensive, complex). Combine for critical use cases.
Source whitelist, content sanitisation before embedding, embedding-space anomaly detection. 100% fix does not exist.
Log all suspicious inputs + LLM output anomalies. Alert on patterns ("ignore previous", etc). <a href="/en/security">Enterno Security Scanner</a> basic checks.