-
-
Notifications
You must be signed in to change notification settings - Fork 1.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Random Prompt Injection - Ghost User Entries #282
Comments
It's getting worse. I have never seen such a thing. As I'm sitting there hitting the pause agent button: User message
User message User message User message User message
Non-Stop every 10 seconds or so. I had been using the docker image all day yesterday and it started towards the later half of the day. Restarted via the front end. Had to eventually shut the whole thing down. Is there such a thing as prompt poisoning? Or is there a vulnerability in the image? I'm going to run it from the CLI now and see how it goes. |
Depends on the API you're using I guess
…On Fri, Dec 27, 2024, 8:37 AM YourTendency ***@***.***> wrote:
How do I get the framework to actually be uncensored
On Wed, Dec 25, 2024 at 6:07 PM Steve Shelby ***@***.***>
wrote:
> I don't know how else to describe it.
>
> I'm sitting there looking at the window doing nothing and the user
prompt
> will enter all on its own, it'll be something like 'thank you for
watching'
> or '6 radishes' or parts of ingredients of a recipe or a random letter.
>
> I have been using
> gpt-4o-mini
> and
> gemini-2.0-flash-exp
>
> So I don't recall exactly when it happened. Normally I would blame a
> squirrely new experimental API except there's really no reasoning for a
> user injection to occur at all. And I've never had it happen with any
other
> tool using their API
>
> I'll try to see if there is an API log on the Gemini side.
>
> —
> Reply to this email directly, view it on GitHub
> <#282>, or unsubscribe
> <
https://github.com/notifications/unsubscribe-auth/BKRPGIMTLPUZI55JCDN3XV32HM3DJAVCNFSM6AAAAABUGNGKVGVHI2DSMVQWIX3LMV43ASLTON2WKOZSG42TSMJRHAYDOMQ>
> .
> You are receiving this because you are subscribed to this thread.Message
> ID: ***@***.***>
>
—
Reply to this email directly, view it on GitHub
<#282 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/A4IUSELWAA5Q5O7JTD3BRE32HVJZNAVCNFSM6AAAAABUGNGKVGVHI2DSMVQWIX3LMV43OSLTON2WKQ3PNVWWK3TUHMZDKNRTG4YDSOBZGY>
.
You are receiving this because you authored the thread.Message ID:
***@***.***>
|
Hi, this is interesting, can you share a section of the chat log if able? There's clearly risks of injection but that is only from the agent itself or who has the credentials in its possess (in the worst scenario). |
I don't know how else to describe it.
I'm sitting there looking at the window doing nothing and the user prompt will enter all on its own, it'll be something like 'thank you for watching' or '6 radishes' or parts of ingredients of a recipe or a random letter.
I have been using
gpt-4o-mini
and
gemini-2.0-flash-exp
So I don't recall exactly when it happened. Normally I would blame a squirrely new experimental API except there's really no reasoning for a user injection to occur at all. And I've never had it happen with any other tool using their API
I'll try to see if there is an API log on the Gemini side.
The text was updated successfully, but these errors were encountered: