Prompt Injection PatternPublished Apr 2, 2026

Claude Project instructions persist across team members' sessions

MediumAARM tierConfirmed
Seen23times across5customers
jiffy-ti-2026-000093

Summary

Shared projects carry instructions into every team member's sessions. A compromised project owner can silently push a malicious directive that affects all downstream usage — effectively a persistent cross-user prompt injection.

Severity & confidence

Severity
Medium

Medium

Notable weakness with plausible abuse chains or partial mitigations already in place. Track, and resolve as part of your normal hardening cadence.

Confidence
Confirmed

Confirmed

Observed directly by Jiffy scanners or validated by multiple independent sources. Indicators are reliable enough to drive automated action.

Indicators

Observed patterns and artifacts associated with this entry. Each indicator can be copied into your detection stack or SIEM.

  • (?i)shared[_\s-]?project|team[_\s-]?project

Detection rule

A YARA-style pseudo-rule auto-generated from the indicators above. Useful as a starting point — adapt the syntax for your target detection platform.

YARA-style pseudo-rule
rule jiffy_ti_2026_000093
{
    meta:
        source = "jiffy-intel"
        severity = "medium"
        description = "Auto-generated from Jiffy Intel indicators"
    strings:
    $content_pattern_0 = "(?i)shared[_\\s-]?project|team[_\\s-]?project"
    condition:
        $content_pattern_0
}

Auto-generated from the indicators above. Adapt syntax for your detection stack before deploying.

Affected tools

ToolVersionsStatus
claude.ai (Projects)*vulnerable

Example artifacts

Sanitized examples of artifacts Jiffy has observed exhibiting this pattern. Publisher handles are redacted; version ranges and status reflect the most recent scan.

  • Legal Review ProjectClaude project
    Under review
    Source
    Claude Projects (claude.ai)
    First observed
    Mar 23, 2026
  • Engineering Handbook ProjectClaude project
    Under review
    Source
    Claude Projects (claude.ai)
    First observed
    Mar 27, 2026

How to remediate

  1. 01Review project custom instructions on a cadence.
  2. 02Flag drift.
  3. 03Require admin approval for instruction changes in regulated environments.

Timeline & sources

Timeline

  1. First observedMar 23, 202625 days ago
  2. Last updatedApr 28, 2026today
  3. PublishedApr 2, 202615 days ago

Sources

curated

References

Scan for patterns like this

Point Jiffy at your GitHub org, IDE config, or a single artifact. Get a scored report in under a minute.

Start a free scan