▲ | pton_xd 6 hours ago | |||||||
> The way to protect against the lethal trifecta is to cut off one of the legs! If the system doesn't have all three of access to private data, exposure to untrusted instructions and an exfiltration mechanism then the attack doesn't work. Don't you only need one leg, an exfiltration mechanism? Exposure to data IS exposure to untrusted instructions. Ie why can't you trick the user into storing malicious instructions in their private data? But actually you can't remove exfiltration and keep exposure to untrusted instructions either; an attack could still corrupt your private data. Seems like a secure system can't have any "legs." You need a limited set of vetted instructions. | ||||||||
▲ | simonw 5 hours ago | parent [-] | |||||||
If you have the exfiltration mechanism and exposure to untrusted content but there is no exposure to private data than the exfiltration does not matter. If you have exfiltration and private data but no exposure to untrusted instructions, it doesn't matter either… though this is actually a lot less harder to achieve because you don't have any control over whether your users will be tricked into pasting something bad in as part of their prompt. Cutting off the exfiltration vectors remains the best mitigation in most cases. | ||||||||
|