Post AxxgyupjYZb7VZBnCS by [email protected] | |
More posts by [email protected] | |
Post #AxxYJOhdJVOMLn5klU by [email protected] | |
0 likes, 1 repeats | |
🤓 Prompt Injection is one of the first attack vectors used to exploit weakne… | |
Post #AxxYLaVyMssDZ0gMTI by [email protected] | |
0 likes, 1 repeats | |
2️⃣ Indirect Prompt Injection: The malicious prompt is hidden inside extern… | |
Post #AxxYNAeBVvfjurHIsS by [email protected] | |
0 likes, 1 repeats | |
3️⃣ Policy Injection: Attackers disguise instructions as if they were offic… | |
Post #AxxYOa0sgmWMsRZ9pg by [email protected] | |
0 likes, 1 repeats | |
4️⃣ Code Injection: Attackers trick the model into generating or suggesting… | |
Post #AxxgyuizxcD5Ag2PhY by [email protected] | |
0 likes, 0 repeats | |
5️⃣ Multimodal Injection: Malicious instructions hidden in images, audio, o… | |
Post #AxxgyupjYZb7VZBnCS by [email protected] | |
0 likes, 0 repeats | |
There are many more prompt injection techniques and variations of these! Let me… | |
Post #AxxgyuxX5Zpttkq1M8 by [email protected] | |
0 likes, 1 repeats | |
@fr0gger Really nice series! |