ยท aka: Pydantic Exploitation, Validation Bypass
Five distinct attack patterns exploit structured output validation (Pydantic, JSON Schema). Attackers craft inputs that pass schema validation while containing malicious payloads in unexpected fields.
Validated data contains hidden malicious content. Downstream systems trust schema-validated input.
Agent using structured output with schema validation (Pydantic, JSON Schema, etc.).