▲ | MattPalmer1086 6 days ago | |||||||
Well, that is my point. There is an inbuilt vulnerability in these systems as they do not (and apparently cannot) separate data and commands. This is just one vector for this, there will be many, many more. | ||||||||
▲ | red75prime 6 days ago | parent [-] | |||||||
LLMs are doing what you train them to do. See for example " The Instruction Hierarchy: Training LLMs to Prioritize Privileged Instructions " by Eric Wallace et al. | ||||||||
|