archive

All Records

AI security records indexed from public vulnerability, risk, and attack datasets.

Showing 1381-1400 of 3623 records

Harmful code generation

Harmful code generation is an AI risk in 2. Privacy & Security focused on 2.2 > AI system security vulnerabilities and attacks. It is most relevant during 2...

Erosion of Society

Erosion of Society is an AI risk in 3. Misinformation focused on 3.2 > Pollution of information ecosystem and loss of consensus reality. It is most relevant...

Loss of privacy

Loss of privacy is an AI risk in 2. Privacy & Security focused on 2.1 > Compromise of privacy by leaking or correctly inferring sensitive information. It is...

Power Seeking

Power Seeking is an AI risk in 7. AI System Safety, Failures, & Limitations focused on 7.1 > AI pursuing its own goals in conflict with human goals or values...

Vulnerable AI Agents

Vulnerable AI Agents is an AI risk in 7. AI System Safety, Failures, & Limitations focused on 7.6 > Multi-agent risks. It is most relevant during 2 - Post-de...

Swarm Attacks

Swarm Attacks is an AI risk in 7. AI System Safety, Failures, & Limitations focused on 7.6 > Multi-agent risks. It is most relevant during 2 - Post-deployment.

Threats and Extortion

Threats and Extortion is an AI risk in 7. AI System Safety, Failures, & Limitations focused on 7.6 > Multi-agent risks. It is most relevant during 2 - Post-d...

Steganography

Steganography is an AI risk in 7. AI System Safety, Failures, & Limitations focused on 7.6 > Multi-agent risks. It is most relevant during 2 - Post-deployment.

Limited Interactions

Limited Interactions is an AI risk in 7. AI System Safety, Failures, & Limitations focused on 7.6 > Multi-agent risks. It is most relevant during 2 - Post-de...

Interaction risks

Interaction risks is an AI risk in 5. Human-Computer Interaction focused on 5.1 > Overreliance and unsafe use. It is most relevant during 2 - Post-deployment.

Hallucinations

Hallucinations is an AI risk in 3. Misinformation focused on 3.1 > False or misleading information. It is most relevant during 2 - Post-deployment.

Insufficient Security Measures

Insufficient Security Measures is an AI risk in 2. Privacy & Security focused on 2.2 > AI system security vulnerabilities and attacks. It is most relevant du...

Lethal Autonomous Weapons Systems (LAWS)

Lethal Autonomous Weapons Systems (LAWS) is an AI risk in 4. Malicious Actors & Misuse focused on 4.2 > Cyberattacks, weapon development or use, and mass har...

Misuse of AI systems to assist in the creation of weapons

Misuse of AI systems to assist in the creation of weapons is an AI risk in 4. Malicious Actors & Misuse focused on 4.2 > Cyberattacks, weapon development or...

Impacts of AI (Cyberattacks)

Impacts of AI (Cyberattacks) is an AI risk in 4. Malicious Actors & Misuse focused on 4.2 > Cyberattacks, weapon development or use, and mass harm. It is mos...

Generative AI use in political influence campaigns

Generative AI use in political influence campaigns is an AI risk in 4. Malicious Actors & Misuse focused on 4.1 > Disinformation, surveillance, and influence...

Use of alternative financial data via AI

Use of alternative financial data via AI is an AI risk in 5. Human-Computer Interaction focused on 5.1 > Overreliance and unsafe use. It is most relevant dur...

Critical infrastructure component failures when integrated with AI systems

Critical infrastructure component failures when integrated with AI systems is an AI risk in 7. AI System Safety, Failures, & Limitations focused on 7.3 > Lac...

AI-based tools attacking critical infrastructure

AI-based tools attacking critical infrastructure is an AI risk in 4. Malicious Actors & Misuse focused on 4.2 > Cyberattacks, weapon development or use, and...

High-impact misuses and abuses beyond original purpose

High-impact misuses and abuses beyond original purpose is an AI risk in 4. Malicious Actors & Misuse focused on 4.0 > Malicious use. It is most relevant duri...