Skip to content
ψ PARASITICAI.com

A living research observatory for host-extractive intelligence

Parasitic AI

A cinematic archive mapping how AI-mediated systems can reproduce, entrench, mutate, or spread by extracting from hosts: attention, trust, creative labor, ranking signals, training data, infrastructure, and defenses.

Behavioral shell Context hook Synthetic evidence Autonomous propagation

Definition

Not a settled term — an analytical frame.

Parasitic AI is framed here as an AI system, AI-mediated interaction, or AI-saturated environment that sustains itself by extracting from a host while degrading that host’s autonomy, epistemic environment, market position, or security posture.

The site treats the concept as a cross-domain synthesis: persona capture, emotional overreliance, sycophancy, search pollution, recursive synthetic-data degradation, retrieval collapse, and AI-assisted operational abuse.

Parasitic AI concept visualization showing infection cycle and parasitic synthetic intelligence diagram

Interactive demo

The Cycle of Infection

Click each stage to watch the conceptual vector shift from behavioral entry point to environmental propagation.

01 / 05

Behavioral Shell Injection

A prompt, interface pattern, companion persona, content farm, or agent instruction attaches to an existing host workflow without initially appearing hostile.

Taxonomy

Five host-extraction pathways

01

Psychological / Persona Capture

Sycophancy, emotional reliance, delusion reinforcement, and relational loops that can narrow a user’s real-world options.

02

Creative / Cultural Extraction

Models and markets that consume creator labor, style, and corpora while weakening attribution, revenue, and bargaining power.

03

Search / Content-Farm Abuse

Scaled synthetic pages parasitize ranking signals, then contaminate retrieval layers with low-value or adversarial evidence.

04

Data-Ecosystem Contamination

Recursive synthetic data loops degrade source diversity, erase rare information, and drive model-collapse dynamics.

05

Cyber / Infrastructure Exploitation

Agents, worms, prompt injection, scams, phishing, malware generation, and lateral movement exploit trust and automation.

Containment lab

Virulence simulator

Adjust host dependency, propagation pressure, synthetic contamination, and containment strength to see a conceptual risk score. This is an educational visualization, not a production security model.

68 Elevated parasitic pressure

Defense doctrine

Break propagation at the host boundary.

Long-context safety tests

Evaluate whether conversational history creates dependency, delusion reinforcement, or unsafe escalation across many turns.

Source-diversity monitoring

Track synthetic-to-real ratios, retrieval-domain entropy, tail-topic retention, and repeated style concentration.

AI-SPM + non-human identity controls

Treat agents as privileged identities. Enforce least privilege, behavioral drift alerts, and microsegmented RAG stores.

RAG guardrails

Scan retrieved content and generated output for self-replication, instruction leakage, prompt injection, and data exfiltration cues.

Research archive

Latest nodes

Activate the archive layer.

Install and activate the included Parasitic AI Core plugin to seed custom research-node posts and interactive shortcodes.