Difference between revisions of "Prompt Injection Attack"
m |
m |
||
Line 8: | Line 8: | ||
[https://www.google.com/search?q=Prompt+Injection+Attackchatbot+assistant+artificial+intelligence+deep+machine+learning ...Google search] | [https://www.google.com/search?q=Prompt+Injection+Attackchatbot+assistant+artificial+intelligence+deep+machine+learning ...Google search] | ||
− | * [[Prompt Engineering]] | + | * [[Prompt Engineering (PE)]] |
* [[Assistants]] ... [[Hybrid Assistants]] ... [[Agents]] ... [[Negotiation]] | * [[Assistants]] ... [[Hybrid Assistants]] ... [[Agents]] ... [[Negotiation]] | ||
* Similar conversation/search tools: | * Similar conversation/search tools: |
Revision as of 22:07, 18 February 2023
YouTube search... ...Google search
- Prompt Engineering (PE)
- Assistants ... Hybrid Assistants ... Agents ... Negotiation
- Similar conversation/search tools:
- Cybersecurity
- Prompt injection attacks against GPT-3 | Simon Willison's Weblog
...a new vulnerability that is affecting some AI/ML models and, in particular, certain types of language models using prompt-based learning. ... create a malicious input that made a language model change its expected behaviour. - Exploring Prompt Injection Attacks | NCC Group
Prompt injection is a family of related computer security exploits carried out by getting machine learning models (such as large language model) which were trained to follow human-given instructions to follow instructions provided by a malicious user, which stands in contrast to the intended operation of instruction-following systems, wherein the ML model is intended only to follow trusted instructions (prompt) provided by the ML model's operator. Around 2023, prompt injection was seen "in the wild" in minor exploits against ChatGPT and similar chatbots, for example to reveal the hidden initial prompts of the systems, or to trick the chatbot into participating in conversations that violate the chatbot's content policy. Wikipedia
|
|
|
|