> * Accessing your accounts or files
> * Sharing your private information
> * Making purchases on your behalf
> * Taking actions you never intended
This should really be at the top of the page and not one full screen below the "Try" button.
> * Accessing your accounts or files
> * Sharing your private information
> * Making purchases on your behalf
> * Taking actions you never intended
This should really be at the top of the page and not one full screen below the "Try" button.
This seems to be the case in llms too. They're getting better and better (with a lot of research) at avoiding doing the bad things. I don't see why its fundamentally intractable to fence system/user/assistant/tool messages to prevent steering from non-trusted inputs, and building new fences for cases we want the steering.
Why is this piece of software particularly different?
But even ignoring that, the gulf between zero days and plain-text LLM prompt injection is miles wide.
Zero days require intensive research to find, and expertise to exploit.
LLM prompt injections obviously exist a priori, and exploiting them requires only the ability to write.
You would think Microsoft, Apple, and Linux would have been sued like crazy by now over 0-days.
There is no such thing as a 'known zero day' vulnerability.
Zero day vulnerability means it is a newly discovered one. Today. The day zero.