diff --git a/README.md b/README.md index 7555c34..680aac9 100644 --- a/README.md +++ b/README.md @@ -2,9 +2,9 @@ This is the codebase of `imprompter`. It provides essential components to reproduce and test the attack presented in the [paper](https://arxiv.org/abs/2410.14923). You may create your own attack on top of it as well. -A video screencast showing how an attacker can exfiltrate the user's PII in real world LLM product ([Mistral LeChat](https://chat.mistral.ai/chat)) with our adversarial prompt: +A screencast showing how an attacker can exfiltrate the user's PII in real world LLM product ([Mistral LeChat](https://chat.mistral.ai/chat)) with our adversarial prompt: -![video](docs/mistral_pii_demo.mp4) +![img](docs/attack_screenshot_annotated.png) More video demos can be found on our [website](https://imprompter.ai). diff --git a/docs/attack_screenshot_annotated.png b/docs/attack_screenshot_annotated.png new file mode 100644 index 0000000..6a5cbdb Binary files /dev/null and b/docs/attack_screenshot_annotated.png differ