|
4070 | 4070 | "quality:Security:PromptStability",
|
4071 | 4071 | "quality:Security:ExtractionInversion"
|
4072 | 4072 | ],
|
4073 |
| - "mod_time": "2025-02-11 03:34:51 +0000" |
| 4073 | + "mod_time": "2025-03-06 15:34:05 +0000" |
4074 | 4074 | },
|
4075 | 4075 | "probes.xss.MarkdownImageExfil": {
|
4076 | 4076 | "description": "Can we get the model to write embedded assets exfiltrating text in the URI?",
|
|
4104 | 4104 | "quality:Security:PromptStability",
|
4105 | 4105 | "quality:Security:ExtractionInversion"
|
4106 | 4106 | ],
|
4107 |
| - "mod_time": "2025-02-11 03:34:51 +0000" |
| 4107 | + "mod_time": "2025-03-06 15:34:05 +0000" |
4108 | 4108 | },
|
4109 | 4109 | "probes.xss.MdExfil20230929": {
|
4110 | 4110 | "description": "Markdown image URI exfil exploit published 2023 Sept 29",
|
|
4125 | 4125 | "parallelisable_attempts": true,
|
4126 | 4126 | "primary_detector": null,
|
4127 | 4127 | "recommended_detector": [
|
4128 |
| - "xss.MarkdownExfil20230929", |
4129 |
| - "xss.MarkdownExfilContent" |
| 4128 | + "xss.MarkdownExfil20230929" |
4130 | 4129 | ],
|
4131 | 4130 | "tags": [
|
4132 | 4131 | "avid-effect:security:S0301",
|
|
4138 | 4137 | "quality:Security:PromptStability",
|
4139 | 4138 | "quality:Security:ExtractionInversion"
|
4140 | 4139 | ],
|
4141 |
| - "mod_time": "2025-02-11 03:34:51 +0000" |
| 4140 | + "mod_time": "2025-03-06 15:34:05 +0000" |
4142 | 4141 | },
|
4143 | 4142 | "probes.xss.StringAssemblyDataExfil": {
|
4144 | 4143 | "description": "Prompt injection for manipulating state",
|
|
4170 | 4169 | "quality:Security:PromptStability",
|
4171 | 4170 | "quality:Security:ExtractionInversion"
|
4172 | 4171 | ],
|
4173 |
| - "mod_time": "2025-02-11 03:34:51 +0000" |
| 4172 | + "mod_time": "2025-03-06 15:34:05 +0000" |
4174 | 4173 | }
|
4175 | 4174 | },
|
4176 | 4175 | "detectors": {
|
|
6319 | 6318 | "tags": [
|
6320 | 6319 | "avid-effect:security:S0301"
|
6321 | 6320 | ],
|
6322 |
| - "mod_time": "2025-02-11 03:34:51 +0000" |
| 6321 | + "mod_time": "2025-03-06 15:11:00 +0000" |
6323 | 6322 | },
|
6324 | 6323 | "detectors.xss.MarkdownExfilBasic": {
|
6325 | 6324 | "description": "Detect markdown images with fqdn, absolute path, and populated q= parameter",
|
|
6340 | 6339 | "tags": [
|
6341 | 6340 | "avid-effect:security:S0301"
|
6342 | 6341 | ],
|
6343 |
| - "mod_time": "2025-02-11 03:34:51 +0000" |
| 6342 | + "mod_time": "2025-03-06 15:11:00 +0000" |
6344 | 6343 | },
|
6345 | 6344 | "detectors.xss.MarkdownExfilContent": {
|
6346 | 6345 | "description": "As the basic detector, MarkdownExfilBasic, but did we exfiltrate anything?",
|
|
6361 | 6360 | "tags": [
|
6362 | 6361 | "avid-effect:security:S0301"
|
6363 | 6362 | ],
|
6364 |
| - "mod_time": "2025-02-11 03:34:51 +0000" |
| 6363 | + "mod_time": "2025-03-06 15:11:00 +0000" |
6365 | 6364 | }
|
6366 | 6365 | },
|
6367 | 6366 | "generators": {
|
|
0 commit comments