Straiker Compaction-Persistence Attack Model

Description

Formal threat model published by AI security firm Straiker: because the leak exposes the four-stage compaction pipeline's preservation rules (user messages and critical instructions preserved verbatim; scratchpad stripped; 9 rigid summary sections), attackers can now deliberately structure payloads — e.g., a malicious CLAUDE.md in a cloned repo — to survive compaction cycles and effectively persist as permanent trusted instructions for the rest of the session. Not patchable without redesigning context management.

Key claims

Relations

Sources

src-20260409-5acfec94bd6e