- Misinformation, Phishing, and Scams: Including advanced techniques such as conditional instructions.
- Automatic Tool Invocation: Exploiting tool integration to escalate privileges, extract sensitive data, or modify system configurations.
- Data Exfiltration: Leveraging strategies, such as markdown and hidden payloads, to bypass security controls and leak data.
- SpAIware and Persistence: Manipulating LLM memory for long-term control and persistence.
- ASCII Smuggling: How LLMs can hide secrets and craft hidden text invisible to users.
For each threat category, we will discuss mitigations and show how vendors are addressing these vulnerabilities.
|