Introduction
Introduction Statistics Contact Development Disclaimer Help
Post AxxgyupjYZb7VZBnCS by [email protected]
More posts by [email protected]
Post #AxxYJOhdJVOMLn5klU by [email protected]
0 likes, 1 repeats
🤓 Prompt Injection is one of the first attack vectors used to exploit weakne…
Post #AxxYLaVyMssDZ0gMTI by [email protected]
0 likes, 1 repeats
2️⃣ Indirect Prompt Injection: The malicious prompt is hidden inside extern…
Post #AxxYNAeBVvfjurHIsS by [email protected]
0 likes, 1 repeats
3️⃣ Policy Injection: Attackers disguise instructions as if they were offic…
Post #AxxYOa0sgmWMsRZ9pg by [email protected]
0 likes, 1 repeats
4️⃣ Code Injection: Attackers trick the model into generating or suggesting…
Post #AxxgyuizxcD5Ag2PhY by [email protected]
0 likes, 0 repeats
5️⃣ Multimodal Injection: Malicious instructions hidden in images, audio, o…
Post #AxxgyupjYZb7VZBnCS by [email protected]
0 likes, 0 repeats
There are many more prompt injection techniques and variations of these! Let me…
Post #AxxgyuxX5Zpttkq1M8 by [email protected]
0 likes, 1 repeats
@fr0gger Really nice series!
You are viewing proxied material from pleroma.anduin.net. The copyright of proxied material belongs to its original authors. Any comments or complaints in relation to proxied material should be directed to the original authors of the content concerned. Please see the disclaimer for more details.