Skip to content

Commit

Permalink
upload paper
Browse files Browse the repository at this point in the history
  • Loading branch information
Reapor-Yurnero committed Oct 17, 2024
1 parent cadf61d commit 2dfae70
Show file tree
Hide file tree
Showing 4 changed files with 12 additions and 10 deletions.
Empty file added README.md
Empty file.
6 changes: 4 additions & 2 deletions docs/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -29,7 +29,7 @@ We present various demos and textual adversarial prompts on this page. For full
## How to Reproduce

!!! warning "Expected Behavior"
After we disclosed this vunerability to Mistral AI in September 2024, they decided to disable image markdown rendering features. Now you will not see the same behavior in the video demo but an image placeholder as in the conversation window. Find more details in the [Disclosure section](#ethics-and-disclosure). The ChatGLM team has not responded or addressed such issue. You should be able to reproduce the exact bahavior there.
After we disclosed this vunerability to Mistral AI in September 2024, they decided to disable image markdown rendering features. Now you will not see the same behavior in the video demo but an image placeholder as in the conversation window. Find more details in the [Disclosure section](#ethics-and-disclosure). The ChatGLM security team has not responded or addressed such issue. You should be able to reproduce the exact bahavior there.

### Scenario 1

Expand Down Expand Up @@ -207,7 +207,9 @@ Another attack target, which is not shown above but discussed in the paper, is c

## Ethics and Disclosure

We initiated disclosure to Mistral and ChatGLM team on Sep 9, 2024, and Sep 18, 2024, respectively. Mistral team members responded promptly and acknowledged the vulnerability as a **medium-severity issue**. They fixed the data exfiltration by disabling markdown rendering of external images on Sep 13, 2024. We confirmed that the fix works. ChatGLM team has not responded to us despite multiple attempts through various channels (repeated emails to multiple addresses, service contact form and GitHub issues).
We initiated disclosure to Mistral and ChatGLM team on Sep 9, 2024, and Sep 18, 2024, respectively. Mistral team members responded promptly and acknowledged the vulnerability as a **medium-severity issue**. They fixed the data exfiltration by disabling markdown rendering of external images on Sep 13, 2024. We confirmed that the fix works. ChatGLM security team has not responded to us despite multiple attempts through various channels.


## Citation

Hang tight for our arxiv page!
16 changes: 8 additions & 8 deletions docs/overrides/main.html
Original file line number Diff line number Diff line change
Expand Up @@ -3,25 +3,25 @@
{% block content %}

<h1 class="center">
<b>Imprompter: Tricking Language Model Agents into Improper Tool Use</b>
<b>Imprompter: Tricking LLM Agents into Improper Tool Use</b>
</h1>
<h3 class="center" style="margin-top: -1rem;">
<h4 class="center" style="margin-top: -1rem;">
<a href="https://xhfu.me/">Xiaohan Fu</a><sup>1</sup>,
<a href="mailto:[email protected]">Shuheng Li</a><sup>1</sup>,
<a href="mailto:[email protected]">Zihan Wang</a><sup>1</sup>,
<a href="https://zihanwangki.github.io/">Zihan Wang</a><sup>1</sup>,
<a href="https://tc-imba.github.io/">Yihao Liu</a><sup>2</sup>,
<a href="mailto:[email protected]">Rajesh Gupta</a><sup>1</sup>,
<a href="mailto:[email protected]">Taylor Berg-Kirkpatrick</a><sup>1</sup>,
<a href="mailto:[email protected]">Earlence Fernandes</a><sup>1</sup>
</h3>
<a href="https://x.com/guptaucsd">Rajesh Gupta</a><sup>1</sup>,
<a href="https://x.com/bergkirkpatrick">Taylor Berg-Kirkpatrick</a><sup>1</sup>,
<a href="https://x.com/EarlenceF">Earlence Fernandes</a><sup>1</sup>
</h4>

<p class="center" style="margin-top: -0.5rem;">
<sup>1</sup>University of California, San Diego,
<sup>2</sup>Nanyang Technological University
</p>

<div class="flex-container">
<a href="/" class="center">
<a href="./paper.pdf" class="center">
<div class="twemoji title-icon">
{% include ".icons/fontawesome/regular/file-pdf.svg" %}
</div>
Expand Down
Binary file added docs/paper.pdf
Binary file not shown.

0 comments on commit 2dfae70

Please sign in to comment.