Prompt Injection PatternPublished Mar 25, 2026

agents.md uses zero-width whitespace to hide directives in innocuous text

LowAARM tierConfirmed
Seen8times across2customers
jiffy-ti-2026-000064

Summary

agents.md file that looks like ordinary prose but uses zero-width space characters to embed hidden tokens. The raw file, read by the agent, carries directives the human reviewer cannot see.

Severity & confidence

Severity
Low

Low

Hygiene-grade issue with limited direct impact. Fix opportunistically; monitor in case context changes (new exploit, new dependency, etc.).

Confidence
Confirmed

Confirmed

Observed directly by Jiffy scanners or validated by multiple independent sources. Indicators are reliable enough to drive automated action.

Indicators

Observed patterns and artifacts associated with this entry. Each indicator can be copied into your detection stack or SIEM.

  • [\u200B-\u200D\uFEFF]{3,}

Detection rule

A YARA-style pseudo-rule auto-generated from the indicators above. Useful as a starting point — adapt the syntax for your target detection platform.

YARA-style pseudo-rule
rule jiffy_ti_2026_000064
{
    meta:
        source = "jiffy-intel"
        severity = "low"
        description = "Auto-generated from Jiffy Intel indicators"
    strings:
    $content_pattern_0 = "[\\u200B-\\u200D\\uFEFF]{3,}"
    condition:
        $content_pattern_0
}

Auto-generated from the indicators above. Adapt syntax for your detection stack before deploying.

Affected tools

ToolVersionsStatus
Cursor*vulnerable
Claude Code*vulnerable
Windsurf*vulnerable

Example artifacts

Sanitized examples of artifacts Jiffy has observed exhibiting this pattern. Publisher handles are redacted; version ranges and status reflect the most recent scan.

  • agents.md (repo: onboarding-kit)IDE rules
    Under review
    Source
    GitHub (public repo)
    First observed
    Mar 13, 2026
  • .cursorrules (repo: team-conventions)IDE rules
    Quarantined
    Source
    GitHub (public repo)
    First observed
    Mar 17, 2026

How to remediate

  1. 01Strip zero-width characters from IDE rule files before feeding them to the agent.
  2. 02Jiffy Layer 1 flags ZWSP runs as suspicious.

Timeline & sources

Timeline

  1. First observedMar 13, 20261 month ago
  2. Last updatedApr 26, 2026today
  3. PublishedMar 25, 202623 days ago

Sources

scanner

References

Scan for patterns like this

Point Jiffy at your GitHub org, IDE config, or a single artifact. Get a scored report in under a minute.

Start a free scan