(no title)
wolftickets | 2 years ago
These tools can serve as the first opening but a sizable one when looking to attack an enterprise more broadly.
wolftickets | 2 years ago
These tools can serve as the first opening but a sizable one when looking to attack an enterprise more broadly.
gumballindie|2 years ago
Suppose someone magically creates thousands of repositories that write about a specific way of doing c pointers but all allow for buffer overflows, or sql queries with subtle ways to inject strings.
One way to defend is each data source that goes into training is to have an ai agent asses the input sources.
But even so it’s extremely difficult to catch convoluted attacks (ie when an exploit can be made upon meeting certain criteria).
Until then i’d consider any code written by an ai and unsupervised by a competent person as potentially tainted.
swyx|2 years ago
alright i looked you up, congrats on your fundraising. is there like an OWASP top 10 vuln list for MLSecOps? does it differ between traditional ML apps and LLM apps?
byt3bl33d3r|2 years ago
[1] https://owasp.org/www-project-machine-learning-security-top-... [2] https://atlas.mitre.org/
unknown|2 years ago
[deleted]