Tag
#llm-security
2 posts tagged llm-security.
-
Adversarial Suffixes: A GCG Practitioner Guide
A working guide to Greedy Coordinate Gradient search — how the algorithm finds adversarial suffixes that bypass safety alignment, what the transferability result means in practice, and how red teams use it today.
- attack-patterns
Tool-Call Hijacking in Agentic Systems
How attackers exploit the gap between LLM reasoning and actual function execution to trigger unauthorized tool calls — exfiltration via email, rogue database writes, and API key theft — and what mitigations actually close the gap.