Top
Best
New

Posted by leontrolski 4 hours ago

"Disregard That" Attacks(calpaterson.com)
30 points | 12 comments
simojo 5 minutes ago|
Today I scheduled a dentist appointment over the phone with an LLM. At the end of the call, I prompted it with various math problems, all of which it answered before politely reminding me that it would prefer to help me with "all things dental."

It did get me thinking the extent to which I could bypass the original prompt and use someone else's tokens for free.

marcus_holmes 4 minutes ago||
The hypothetical approach I've heard of is to have two context windows, one trusted and one untrusted (usually phrased as separating the system prompt and the user prompt).

I don't know enough about LLM training or architecture to know if this is actually possible, though. Anyone care to comment?

stingraycharles 42 minutes ago||
I didn’t see the article talk specifically about this, or at least not in enough detail, but isn’t the de-facto standard mitigation for this to use guardrails which lets some other LLM that has been specifically tuned for these kind of things evaluate the safety of the content to be injected?

There are a lot of services out there that offer these types of AI guardrails, and it doesn’t have to be expensive.

Not saying that this approach is foolproof, but it’s better than relying solely on better prompting or human review.

mannanj 36 minutes ago|
The article does mention this and a weakness of that approach is mentioned too.
wbeckler 8 seconds ago|||
The article didn't describe how the second AI is tuned to distrust input and scan it for "disregard that." Instead it showed an architecture where a second AI accepts input from a naively implemented firewall AI that isn't scanning for "disregard that"
crisnoble 22 minutes ago|||
Perhaps they asked AI to summarize the article for them and it stopped after the first "disregard that" it read into its context window.
lmm 1 hour ago||
The bowdlerisation of today's internet continues to annoy me. To be clear, the joke is traditionally "HAHA DISREGARD THAT, I SUCK COCKS".
arcfour 2 minutes ago||
I'm glad I wasn't alone in finding it ridiculous/annoying. The version in the post isn't even a joke anymore...
Sniffnoy 1 hour ago|||
Also, the form that appears in the article isn't really a joke. A big part of what makes the original funny isn't just the form of the "attack" but the content itself, in particular the contrast between the formality of "disregard that" and the vulgarity of "I suck cocks". If it hadn't been so vulgar, or if it had said "ignore" instead of "disregard", it wouldn't be so funny.

Edit: Also part of what makes it funny how succinct and sudden it is. I think actually it would still be funny with "ignore" instead of "disregard", but it would be lessened a bit.

stavros 1 hour ago|||
But that has bad words in it!

EDIT: https://web.archive.org/web/20080702204110/http://bash.org/?...

huflungdung 1 hour ago||
[dead]
wenldev 1 hour ago||
I think a big part of mitigating this will probably be requiring multiple agents to think and achieve consensus before significant actions. Like planes with multiple engines
arijun 1 hour ago|
I mean, no security is perfect, it's just trying to be "good enough" (where "good enough" varies by application). If you've ever downloaded and used a package using pip or npm and used it without poring over every line of code, you've opened yourself up to an attack. I will keep doing that for my personal projects, though.

I think the question is, how much risk is involved and how much do those mitigating methods reduce it? And with that, we can figure out what applications it is appropriate for.