1 code implementation • 10 Feb 2024 • Jonathan Evertz, Merlin Chlosta, Lea Schönherr, Thorsten Eisenhofer
Specifically, malicious tools can exploit vulnerabilities in the LLM itself to manipulate the model and compromise the data of other services, raising the question of how private data can be protected in the context of LLM integrations.