← Back to projects
2026 live

Poison Pill

A red-team text lab showing how human-visible copy can differ from machine-visible payloads via hidden channels.

  • Astro
  • TypeScript
  • Prompt Injection Research
  • Zero-Width Encoding
  • AI Safety UX
Poison Pill preview

Problem

Teams often assume the text humans read is the same text models parse, which leaves hidden-channel injection risk under-tested.

Solution

Built an interactive composer + detector that contrasts visible copy with machine-extracted payloads across zero-width and HTML-comment channels.

Impact

Makes prompt-injection and context-poisoning mechanics concrete for product, design, and engineering teams during reviews and threat modeling.

Poison Pill is a concept project about model perception, not just model capability.

Open the live demo: Poison Pill.

Core idea

Humans evaluate visible semantics. Models can also consume hidden semantics when text includes invisible or metadata channels.

If teams only QA the visible layer, they miss part of the threat surface.

What the demo includes

  1. Composer for human-visible text + hidden machine payload
  2. Channel selection (zero-width, comment, hybrid)
  3. Machine extraction preview showing what can be decoded
  4. Detector mode to inspect suspicious text for hidden channels

Why this matters

This is a practical reminder that AI systems are parsers, not human readers. Secure AI UX has to account for what the model can parse, not only what people can see.

Demo Mirror

Live Preview

Mini preview of the actual demo. Use the launch button for full-screen interaction.

Open Demo