ARTFEED — Contemporary Art Intelligence

IPI-proxy: Open-Source Toolkit for Red-Teaming Web-Browsing AI Agents Against Indirect Prompt Injection

ai-technology · 2026-05-13

A new open-source toolkit named IPI-proxy has been introduced by researchers to enhance the security of web-browsing AI agents against indirect prompt injection (IPI) attacks. This tool fills a crucial void in current security measures: existing benchmarks provide pre-made adversarial pages that whitelisted agents cannot access, while generic LLM scanners focus on the model API instead of the content retrieved. IPI-proxy functions as an intercepting proxy that modifies actual HTTP responses from approved domains in real time. It incorporates payloads from a consolidated library of 820 unique attack strings derived from six benchmarks: BIPIA, InjecAgent, AgentDojo, Tensor Trust, WASP, and LLMail-Inject. Additionally, it features a YAML-based test harness for independent parameterization of attack scenarios. This advancement is vital as web-browsing AI agents are increasingly used in enterprises with strict domain whitelists, yet attackers can still manipulate them through concealed instructions in HTML pages from those authorized domains. The research paper can be found on arXiv with the identifier 2605.11868.

Key facts

  • IPI-proxy is an open-source toolkit for red-teaming web-browsing AI agents against indirect prompt injection (IPI).
  • It operates as an intercepting proxy that rewrites real HTTP responses from whitelisted domains in flight.
  • The toolkit embeds payloads from a unified library of 820 deduplicated attack strings.
  • Attack strings are extracted from six published benchmarks: BIPIA, InjecAgent, AgentDojo, Tensor Trust, WASP, and LLMail-Inject.
  • A YAML-driven test harness independently parameterizes the attack scenarios.
  • Existing red-teaming resources fall short because pre-built adversarial pages are unreachable by whitelisted agents, and generic LLM scanners probe the model API rather than retrieved content.
  • Web-browsing AI agents are increasingly deployed in enterprise settings under strict domain whitelists.
  • Adversaries can influence agents by embedding hidden instructions in HTML pages from approved domains.

Entities

Institutions

  • arXiv

Sources