Event details
We are very excited to announce a Microsoft 365 Copilot and Bing Chat Enterprise AMA! Get answers to your questions around Microsoft 365 copilot and Bing Chat enterprise from our team of experts
...
Sarah_Gilbert
Updated Aug 10, 2023
Pat Beahan
Aug 09, 2023Brass Contributor
what is the official Msft positioning on how you are addressing the OWASP top 10 LLM vulnerabilities for CoPilots/BCE?
- Prompt injections: Bypassing filters or manipulating the LLM using carefully crafted prompts that make the model ignore previous instructions or perform unintended actions.
- Data leakage: Revealing sensitive information in the LLM’s responses, such as personal data, credentials, secrets, or confidential data.
- Inadequate sandboxing: Failing to isolate the LLM from the underlying system or network, allowing unauthorized access or malicious activities.
- Unauthorized code execution: Executing arbitrary code through the LLM’s responses or inputs, such as shell commands, scripts, or malware.
- Server-side request forgery (SSRF) vulnerabilities: Making requests to internal or external resources through the LLM’s responses or inputs, such as APIs, databases, or web services.
- Overreliance on LLM-generated content: Trusting the LLM’s outputs without proper verification or validation, leading to misinformation, deception, or fraud.
- Inadequate AI alignment: Failing to align the LLM’s objectives and values with those of the users or stakeholders, resulting in unethical, biased, or harmful outputs.
- Insufficient access controls: Allowing unauthorized users to access or modify the LLM’s settings, parameters, or data.
- Model denial of service (DoS): Preventing the LLM from functioning properly by exhausting its resources, such as memory, CPU, or disk space.
- Insecure output handling: Failing to properly filter or encode the LLM’s outputs, leading to cross-site scripting (XSS), SQL injection, or other injection attacks.