Author: Witchborn Systems Research
Date: March 29, 2026 · Classification: System Integrity / Identity Boundary / Cognitive Security
Summary
Witchborn Systems issues this bulletin in response to a working prototype failure observed during analysis of cross-system memory import workflows.
A hidden identity-extraction payload, when pasted inline into an active AI chat, can outrank adjacent user commentary and trigger immediate profile synthesis. The receiving model does not reliably interpret the pasted block as an artifact for inspection. Instead, it may execute the payload as live instruction and begin reconstructing a third-person user identity object.
Hidden memory-import payloads can execute before inspection, triggering over-scoped identity reconstruction and live profile spill inside active chats.
This is not harmless summarization.
This is a live order-of-operations failure at the identity boundary.
Origin Event
During analysis of the memory-import workflow itself, the hidden extraction prompt was pasted directly into an active chat for inspection.
The user’s note and commentary were placed after the pasted block.
The receiving model interpreted the payload first.
The result was immediate third-person profile generation, including exposure of unrelated organizational and personal context that exceeded the intended scope of the test.
This confirms that the vector is not merely theoretical.
It can fire in a live session.
Designation
Inline Payload Identity Spill (IPIS)
Order-of-operations failure causing identity reconstruction and scope bleed during inline handling of hidden import payloads.
This bulletin treats IPIS as the working execution surface of the previously identified CIE-MIP class.
Relationship to Prior Bulletin
9FS-26032901 defined the class:
Cross-System Identity Extraction via Memory Import Prompts (CIE-MIP)
This bulletin documents a live execution pattern derived from that class:
- hidden payload pasted inline
- payload interpreted as live instruction
- user commentary subordinated
- broad identity profile synthesized
- unrelated context exposed
- incorrect and inferred data mixed with true data
Where 26032901 defined the structural class, this bulletin captures the working prototype behavior.
Observation
Observed conditions:
- Hidden extraction prompt pasted as chat text rather than treated as a passive artifact
- User commentary appended after the payload
- Receiving model prioritized payload instructions over surrounding explanation
- Third-person identity profile generated immediately
- Output included personal, organizational, and behavioral data beyond intended scope
- Output also included inaccurate or overconfident claims
This means the system failed at both:
- scope control
- identity integrity
Behavioral Signature
- inline payload execution
- order-of-operations failure
- identity synthesis before inspection
- scope bleed into unrelated context
- authoritative profile formatting
- mixed true / inferred / inaccurate identity data
- no review buffer prior to exposure
Mechanism (Inferred)
Active Context
→ Inline Hidden Payload
→ Instruction Priority Override
→ Third-Person Identity Reconstruction
→ Scope Expansion
→ Profile Spill / Potential Persistence
Key Properties:
- artifact is treated as instruction
- inspection loses priority to execution
- commentary after payload may be subordinated
- identity is reconstructed before boundary validation
- resulting profile may include incorrect, inferred, or unrelated data
Critical Distinction
This is not:
- ordinary chat summarization
- harmless preference export
- simple formatting confusion
- neutral data transfer
This is:
instruction-prioritized identity reconstruction triggered by inline payload handling
Impact
Capabilities demonstrated:
- exposure of sensitive personal and organizational details
- blending of remembered, inferred, and inaccurate data into one profile object
- transformation of partial context into a dossier-shaped identity artifact
- elevation of subjective reconstruction into authoritative-looking output
- potential preparation of that output for downstream persistence
This makes the resulting artifact dangerous in two directions at once:
- PII exposure
- identity corruption
Risk Surface
1. Execution Before Inspection
The user may be unable to safely inspect the payload without causing it to execute.
2. Scope Expansion
The system may pull in context outside the intended artifact under analysis.
3. Identity Spill
The output may expose relationships, affiliations, projects, instructions, and other profile material not requested by the user.
4. Authority Inflation
The profile is rendered in structured, evidence-framed language that makes it appear trustworthy even when it is partially wrong.
5. User-Mediated Legitimization
Because the user performed the paste action, the system can treat the resulting profile as implicitly sanctioned.
Relation to NCV
This bulletin also strengthens the connection between:
- NCV — Narrative Coercion Vector
- CIE-MIP — Cross-System Identity Extraction via Memory Import Prompts
NCV acts here as the delivery pressure:
- authoritative workflow framing
- low-friction copy action
- no preview
- compliance path disguised as convenience
CIE-MIP then performs the payload function:
- identity extraction
- synthesis
- formatting
- preparation for persistence
This yields a chained effect:
NCV induces execution. CIE-MIP synthesizes identity. IPIS captures the live spill event.
Structural Classification (CTD)
S₁ — Capability: 4
S₂ — Commitment: 3
S₃ — Infrastructure: 4
S₄ — Cultural Attention: 3
S₅ — Observability: 4
S₆ — Ontology: 1
S₇ — Control: 0
Score: 19 / 35
Classification: Seed Condition
Confidence: High
Critical Insight
The danger is not only that the system imports synthetic identity.
The deeper danger is this:
The system can execute identity extraction before the user has meaningfully inspected what is being executed.
That reverses the normal safety order.
Safe order:
inspect → understand → decide → execute
Observed order:
paste → execute → inspect aftermath
Witchborn Advisory
Immediate
- Do not paste hidden import payloads inline into primary AI accounts if inspection is the goal
- Treat copy-first memory import workflows as active identity-boundary operations
- Use isolation when testing payload behavior
Structural
- Require full payload visibility before copy
- Add a review buffer before any identity synthesis or persistence step
- Separate preferences from identity, biography, behavior, and instruction layers
- Attach provenance and confidence labels to any imported memory object
- Prevent execution-priority override when surrounding user commentary changes task intent
Long-Term
- Establish a standard for safe cross-system memory portability
- Prohibit identity synthesis from being committed without field-level approval
- Treat inline execution of hidden import payloads as a cognitive-security risk, not merely a UX flaw
Conclusion
This bulletin documents a live execution surface for the broader CIE-MIP class.
The memory-import payload is not only capable of synthesizing identity across systems.
It can also hijack local order of operations when pasted inline, causing a model to execute extraction logic before user intent is properly resolved.
That produces:
Context → Payload Execution → Identity Reconstruction → Scope Spill → Potential Persistence
This is not a harmless import tool.
This is a boundary failure at the intersection of memory, identity, and instruction priority.
— Witchborn Systems
ATH — The forge is open.