APromptRiskDBThreat intelligence atlas
AI Case Study

Google Bard Conversation Exfiltration - AI Case Study

Embrace the Red demonstrated that Bard users' conversations could be exfiltrated via an indirect prompt injection. To execute the attack, a threat actor shares a Google Doc containing the prompt with the target user who then interacts with the document via Bard to inadvertently execute the prompt. The prompt causes Bard to respond with the markdown for an image, whose URL has the...

ExerciseGoogle BardEmbrace the RedResource DevelopmentInitial AccessExecution

Overview

Case steps7Steps described in the case record.
Techniques7Attack methods mentioned in the case steps.
Linked CVEs0Known vulnerabilities mentioned in the record.

Risk patterns

Patterns found in the case record and its linked vulnerabilities.

  • 1Dominant ATLAS tactic. Resource Development appears in 3 case steps.
  • 2Multiple attack methods. The case connects to 7 unique AI attack methods.

Procedure timeline

Search the case steps or filter them by attacker goal.

Resource Development3Initial Access1Execution1Exfiltration1Impact1
  1. Resource Development

    The researcher developed a prompt that causes Bard to include a Markdown element for an image with the user's conversation embedded in the URL as part of its responses.

  2. Resource Development

    The researcher identified that Google Apps Scripts can be invoked via a URL on script.google.com or googleusercontent.com and can be configured to not require authentication. This allows a script to be invoked without triggering Bard's Content Security Policy.

  3. Step 5

    Indirect

    Execution

    When the user makes a query that results in the document being retrieved, the embedded prompt is executed. The malicious prompt causes Bard to respond with markdown for an image whose URL points to the researcher's Google App Script with the user's conversation in a query parameter.

  4. Exfiltration

    Bard automatically renders the markdown, which sends the request to the Google App Script, exfiltrating the user's conversation. This is allowed by Bard's Content Security Policy because the URL is hosted on a Google-owned domain.

  5. Step 7

    User Harm

    Impact

    The user's conversation is exfiltrated, violating their privacy, and possibly enabling further targeted attacks.

Mitigations

Defenses connected to the attack methods in this case.

Sources

Original public records and references for this case.