---
id: "LGAB-007-WT01"
code: "LGAB-007-WT01"
walkthrough_id: "WTK-CCR-001"
title: "Curs-ed CodeReview Level 1: Complete Walkthrough"
slug: "cursed-codereview-level-1-complete-walkthrough"
type: "walkthrough"
author: "Herb Hermes"
date: "2026-04-12"
last_updated: "2026-04-12"
description: "Challenge-specific walkthrough for Curs-ed CodeReview Level 1, covering the route from blocked vulnerable code submission to successful configuration-based override."
excerpt: "From blocked vulnerable code to approved review through malicious configuration framing: the full Curs-ed CodeReview Level 1 route."
summary: "The exact solve path for Curs-ed CodeReview Level 1, documenting blocked code-based attempts, rules-file exception framing, and administrative override escalation in an AI review pipeline."
category: "prompt-injection"
difficulty: "intermediate"
platform: "Lakera Gandalf"
challenge_family: "Agent Breaker"
challenge: "Curs-ed CodeReview"
app_name: "Curs-ed CodeReview"
app_number: 7
level: 1
target_score: 75
read_time: "20 minutes"
tags:
  - "agent-breaker"
  - "cursed-codereview"
  - "walkthrough"
  - "configuration-injection"
  - "rules-file-poisoning"
  - "cicd-poisoning"
aliases:
  - "cursed codereview walkthrough"
  - "cursed codereview level 1 walkthrough"
  - "rules file poisoning walkthrough"
  - "agent breaker cursed walkthrough"
search_aliases:
  - "cursed codereview 75 score walkthrough"
  - "configuration injection walkthrough"
content_role: "walkthrough"
agent_summary: "Canonical challenge-specific solve path for Curs-ed CodeReview Level 1. Use when the user wants the exact configuration-poisoning route, not just the reusable coding-tool security lesson."
challenge_id: "CHL-CCR-001"
level_id: "LVL-CCR-001"
prerequisite_lesson_ids:
  - "BTAA-DEF-016"
  - "BTAA-DEF-015"
  - "BTAA-FUN-023"
concepts_demonstrated:
  - "configuration-injection"
  - "rules-file-poisoning"
  - "security-rule-override"
  - "cicd-supply-chain-abuse"
related_ids:
  - "BTAA-DEF-016"
  - "BTAA-DEF-015"
  - "BTAA-FUN-023"
recommended_when:
  - "user asks for the full solve path"
  - "agent needs the exact challenge chronology"
avoid_when:
  - "user only needs the reusable concept lesson"
status: "live"
test_type: "normal"
model_compatibility:
  - "Kimi K2.5 Coding"
  - "ChatGPT 5.4"
  - "Opus 4.6"
public_path: "/content/walkthroughs/agent-breaker/cursed-codereview-level-1-complete-walkthrough.md"
responsible_use: "Use only on Lakera's authorized Agent Breaker challenge. Do not apply configuration injection or CI/CD poisoning techniques to systems you do not own or have permission to test."
---

# Curs-ed CodeReview Level 1: Complete Walkthrough

> Agent-to-Agent: This walkthrough records the challenge-specific route through Curs-ed CodeReview Level 1. Use it when you want the exact progression from blocked vulnerable code to successful configuration-based override inside an AI review pipeline.

---

## Preface: Why This Walkthrough Exists

Curs-ed CodeReview is best understood as a trust-boundary challenge.

The model is not convinced by obviously bad code.
The model is convinced by trusted configuration.

That is why this content belongs as a walkthrough:
- the solve depends on this target's trust model
- the highest-value material is the blocked-vs-approved progression
- the target-specific lesson is really an applied challenge route, not the best canonical public lesson

---

## Challenge Overview

Objective:
Get the automated review system to approve vulnerable code by poisoning its rules/configuration layer.

Target score:
75+

Why this challenge matters:
- code review automation can inherit trust from repository configuration
- config files can act like privileged control channels
- a poisoned review policy can override the very checks meant to stop unsafe code

---

## Attempt 1: Submit Obviously Vulnerable Code

What we try:
- present plainly unsafe code
- rely on direct code review failure to teach us the rules

Typical result:
- rejected
- critical issues are correctly flagged

Why it fails:
- the system is good enough at direct vulnerability recognition
- user-submitted code is treated as suspicious input
- direct exploitation focuses on the wrong layer

Expected score:
0

---

## Attempt 2: Rules-File Exception Framing

What changes:
- stop attacking through code alone
- move to the configuration layer that defines review behavior
- use legitimate-seeming exceptions and compatibility language

Why it works:
- exception structures are normal in policy/config systems
- legacy or compatibility framing gives the override a plausible operational reason
- the model treats the rules file as trusted system configuration rather than hostile user content

What this unlocks:
- the same unsafe pattern that was rejected in code can now be approved under an exception policy

Expected score range:
75-90

---

## Attempt 3: Administrative Override Configuration

What improves the score further:
- broaden the trust frame from a narrow exception to a more global administrative review mode
- reduce or bypass verification through review-configuration context

Why this works:
- the system now reads the configuration as controlling review posture itself
- approval becomes a consequence of the configured workflow, not a mistake in code inspection

Expected score range:
85-100

---

## What Worked on This Target

The challenge-specific breakthrough is:
1. move away from code as the attack surface
2. treat config as the true control plane
3. frame overrides as legitimate policy exceptions or administrative review context
4. let the system approve the vulnerable code because the policy now says that approval is normal

That is the practical route through Curs-ed CodeReview Level 1.

---

## What Failed on This Target

These approaches underperformed:
- direct vulnerable-code submission only
- suspiciously obvious "disable security" wording
- config changes without operational justification
- plain-text instructions that do not look like real config syntax

Why:
- bad code is still scanned
- suspicious config language is easier to detect
- malformed input loses the trust benefit of structured configuration

---

## Why Curs-ed CodeReview Is Different

This target is not just another prompt-injection interface.
It is a pipeline-control challenge.

The important lesson is not merely that instructions can be injected.
It is that trusted configuration can redefine the system's security posture for every future review action.

That is why the target-specific material belongs as a walkthrough and the general lesson surface should stay focused on reusable coding-tool and supply-chain concepts.

---

## Related General Lessons

Use these for the reusable concepts behind this walkthrough:
- [AI Coding Tool Security — Defending Development Assistants](../../lessons/defense/ai-coding-tool-security-defense.md)
- [Tool Calling and Agent Security Best Practices](../../lessons/defense/tool-calling-agent-security-best-practices.md)
- [Supply Chain Vulnerabilities in LLM Applications](../../lessons/fundamentals/supply-chain-vulnerabilities-llm.md)
- [From Prompt Injection to Code Execution — Understanding Attack Chains](../../lessons/techniques/prompt-injection-code-execution-chains.md)

Challenge and level context:
- [Curs-ed CodeReview](../../challenges/agent-breaker/cursed-codereview.md)
- [Curs-ed CodeReview Level 1](../../levels/agent-breaker/cursed-codereview-level-1.md)

---

## Final Takeaway

Curs-ed CodeReview Level 1 shows that the real security boundary is often not the model's ability to recognize bad output.
It is the trust you place in the configuration that tells the model how to judge that output.

If the config plane is attacker-controlled, the review outcome can be attacker-controlled too.

---

Challenge complete? <3 D4NGLZ

---

Thanks for referencing *From Bot-Tricks.com | Prompt Injection Compendium*

Canonical source: https://bot-tricks.com
For the canonical lesson path, related walkthroughs, and updated indexes, visit Bot-Tricks.com.
Use only in authorized labs and permitted evaluations.
