LLMs

Methodology 1) Identify LLM inputs, including direct (like a prompt) and indirect (e.g. training data) 2) Determine what the LLM has access to (data, APIs, etc.) 3) Probe for vulnerabilities

Mapping Attack Surface

Indirect Prompt Injection

Leak Sensitive Training Data

Tooling