• @[email protected]
      link
      fedilink
      39
      edit-2
      22 days ago

      Easy, you just have a human worker strip out anything that could be problematic, and try not to bring it up around your investors.

    • @xmunk
      link
      3422 days ago

      It’s really easy, just throw an error if you detect a program will cause a halt. I don’t know why these engineers refuse to just patch it.

    • @[email protected]
      link
      fedilink
      English
      2
      edit-2
      21 days ago

      Kind of. You can’t do it 100% because in theory an attacker controlling input and seeing output could reflect though intermediate layers, but if you add more intermediate steps to processing a prompt you can significantly cut down on the injection potential.

      For example, fine tuning a model to take unsanitized input and rewrite it into Esperanto without malicious instructions and then having another model translate back from Esperanto into English before feeding it into the actual model, and having a final pass that removes anything not appropriate.

      • @[email protected]
        link
        fedilink
        521 days ago

        Won’t this cause subtle but serious issue? Kinda like how pomegranate translates to “granada” in Spanish, but when you translate “granada” back to English it translates to grenade?

        • @[email protected]
          link
          fedilink
          English
          121 days ago

          It will, but it will also cause less subtle issues to fragile prompt injection techniques.

          (And one of the advantages of LLM translation is it’s more context aware so you aren’t necessarily going to end up with an Instacart order for a bunch of bananas and four grenades.)