top | item 46863645

(no title)

BrouteMinou | 27 days ago

You are not crazy; that's the number one security issue with LLM. They can't, with certainty, differenciate a command from data.

Social, err... Clanker engineering!

discuss

order

jfyi|26 days ago

>differenciate a command from data

This is something computers in general have struggled with. We have 40 years of countermeasures and still have buffer overflow exploits happening.

zbentley|26 days ago

That's not even slightly the same thing.

A buffer overflow has nothing to do with differentiating a command from data; it has to do with mishandling commands or data. An overflow-equivalent LLM misbehavior would be something more like ... I don't know, losing the context, providing answers to a different/unrelated prompt, or (very charitably/guessing here) leaking the system prompt, I guess?

Also, buffer overflows are programmatic issues (once you fix a buffer overflow, it's gone forever if the system doesn't change), not an operational characteristics (if you make an LLM really good at telling commands apart from data, it can still fail--just like if you make an AC distributed system really good at partition tolerance, it can still fail).

A better example would be SQL injection--a classical failure to separate commands from data. But that, too, is a programmatic issue and not an operational characteristic. "Human programmers make this mistake all the time" does not make something an operational characteristic of the software those programmers create; it just makes it a common mistake.