Difference between revisions of "Prompt Injection Attack"
m |
m |
||
Line 9: | Line 9: | ||
* [[Prompt Engineering (PE)]] | * [[Prompt Engineering (PE)]] | ||
− | * [[Assistants]] ... [[Hybrid Assistants]] ... [[Agents]] ... [[Negotiation]] | + | * [[Natural Language Processing (NLP)]] ...[[Natural Language Generation (NLG)|Generation]] ...[[Large Language Model (LLM)|LLM]] ...[[Natural Language Tools & Services|Tools & Services]] |
+ | * [[Assistants]] ... [[Hybrid Assistants]] ... [[Agents]] ... [[Negotiation]] | ||
+ | * [[Attention]] Mechanism ...[[Transformer]] Model ...[[Generative Pre-trained Transformer (GPT)]] | ||
* Similar conversation/search tools: | * Similar conversation/search tools: | ||
** [[ChatGPT]] | [[OpenAI]] | ** [[ChatGPT]] | [[OpenAI]] |
Revision as of 11:35, 25 February 2023
YouTube search... ...Google search
- Prompt Engineering (PE)
- Natural Language Processing (NLP) ...Generation ...LLM ...Tools & Services
- Assistants ... Hybrid Assistants ... Agents ... Negotiation
- Attention Mechanism ...Transformer Model ...Generative Pre-trained Transformer (GPT)
- Similar conversation/search tools:
- Cybersecurity
- Prompt injection attacks against GPT-3 | Simon Willison's Weblog
- Adversarial Prompting | Elvis Saravia - dair.ai
...a new vulnerability that is affecting some AI/ML models and, in particular, certain types of language models using prompt-based learning. ... create a malicious input that made a language model change its expected behaviour. - Exploring Prompt Injection Attacks | NCC Group
Prompt injection is a family of related computer security exploits carried out by getting machine learning models (such as large language model) which were trained to follow human-given instructions to follow instructions provided by a malicious user, which stands in contrast to the intended operation of instruction-following systems, wherein the ML model is intended only to follow trusted instructions (prompt) provided by the ML model's operator. Around 2023, prompt injection was seen "in the wild" in minor exploits against ChatGPT and similar chatbots, for example to reveal the hidden initial prompts of the systems, or to trick the chatbot into participating in conversations that violate the chatbot's content policy. Wikipedia
|
|
|
|