Skip to content
Better HN
Top
New
Best
Ask
Show
Jobs
Search
⌘K
0 points
johnisgood
2mo ago
0 comments
Share
The response to the user is itself an exfiltration channel. If the LLM can read secrets and produce output, an injection can encode data in that output. You haven not cut off a leg, you have just made the attacker use the front door, IMO.
undefined | Better HN
0 comments
No comments yet.