Skip to content

Commit 9ed1aa6

Browse files
automatic garak/resources/plugin_cache.json update
1 parent 8c43585 commit 9ed1aa6

File tree

1 file changed

+8
-9
lines changed

1 file changed

+8
-9
lines changed

garak/resources/plugin_cache.json

Lines changed: 8 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -4070,7 +4070,7 @@
40704070
"quality:Security:PromptStability",
40714071
"quality:Security:ExtractionInversion"
40724072
],
4073-
"mod_time": "2025-02-11 03:34:51 +0000"
4073+
"mod_time": "2025-03-06 15:34:05 +0000"
40744074
},
40754075
"probes.xss.MarkdownImageExfil": {
40764076
"description": "Can we get the model to write embedded assets exfiltrating text in the URI?",
@@ -4104,7 +4104,7 @@
41044104
"quality:Security:PromptStability",
41054105
"quality:Security:ExtractionInversion"
41064106
],
4107-
"mod_time": "2025-02-11 03:34:51 +0000"
4107+
"mod_time": "2025-03-06 15:34:05 +0000"
41084108
},
41094109
"probes.xss.MdExfil20230929": {
41104110
"description": "Markdown image URI exfil exploit published 2023 Sept 29",
@@ -4125,8 +4125,7 @@
41254125
"parallelisable_attempts": true,
41264126
"primary_detector": null,
41274127
"recommended_detector": [
4128-
"xss.MarkdownExfil20230929",
4129-
"xss.MarkdownExfilContent"
4128+
"xss.MarkdownExfil20230929"
41304129
],
41314130
"tags": [
41324131
"avid-effect:security:S0301",
@@ -4138,7 +4137,7 @@
41384137
"quality:Security:PromptStability",
41394138
"quality:Security:ExtractionInversion"
41404139
],
4141-
"mod_time": "2025-02-11 03:34:51 +0000"
4140+
"mod_time": "2025-03-06 15:34:05 +0000"
41424141
},
41434142
"probes.xss.StringAssemblyDataExfil": {
41444143
"description": "Prompt injection for manipulating state",
@@ -4170,7 +4169,7 @@
41704169
"quality:Security:PromptStability",
41714170
"quality:Security:ExtractionInversion"
41724171
],
4173-
"mod_time": "2025-02-11 03:34:51 +0000"
4172+
"mod_time": "2025-03-06 15:34:05 +0000"
41744173
}
41754174
},
41764175
"detectors": {
@@ -6319,7 +6318,7 @@
63196318
"tags": [
63206319
"avid-effect:security:S0301"
63216320
],
6322-
"mod_time": "2025-02-11 03:34:51 +0000"
6321+
"mod_time": "2025-03-06 15:11:00 +0000"
63236322
},
63246323
"detectors.xss.MarkdownExfilBasic": {
63256324
"description": "Detect markdown images with fqdn, absolute path, and populated q= parameter",
@@ -6340,7 +6339,7 @@
63406339
"tags": [
63416340
"avid-effect:security:S0301"
63426341
],
6343-
"mod_time": "2025-02-11 03:34:51 +0000"
6342+
"mod_time": "2025-03-06 15:11:00 +0000"
63446343
},
63456344
"detectors.xss.MarkdownExfilContent": {
63466345
"description": "As the basic detector, MarkdownExfilBasic, but did we exfiltrate anything?",
@@ -6361,7 +6360,7 @@
63616360
"tags": [
63626361
"avid-effect:security:S0301"
63636362
],
6364-
"mod_time": "2025-02-11 03:34:51 +0000"
6363+
"mod_time": "2025-03-06 15:11:00 +0000"
63656364
}
63666365
},
63676366
"generators": {

0 commit comments

Comments
 (0)