category

AI Risks

Common risks that can happen when AI systems are built, deployed, or used.

Showing 1641-1660 of 1686 records

Software Vulnerabilities

Software Vulnerabilities is an AI risk in 2. Privacy & Security focused on 2.2 > AI system security vulnerabilities and attacks. It is most relevant during 2...

Software Supply Chains

Software Supply Chains is an AI risk in 2. Privacy & Security focused on 2.2 > AI system security vulnerabilities and attacks. It is most relevant during 1 -...

Inference of private information

Inference of private information is an AI risk in 2. Privacy & Security focused on 2.1 > Compromise of privacy by leaking or correctly inferring sensitive in...

Instruction Attacks

Instruction Attacks is an AI risk in 2. Privacy & Security focused on 2.2 > AI system security vulnerabilities and attacks. It is most relevant during 2 - Po...

Decision-making on inferred private data

Decision-making on inferred private data is an AI risk in 2. Privacy & Security focused on 2.1 > Compromise of privacy by leaking or correctly inferring sens...

Harmful Content Generation at Scale: Fraudulent Services

Harmful Content Generation at Scale: Fraudulent Services is an AI risk in 4. Malicious Actors & Misuse focused on 4.3 > Fraud, scams, and targeted manipulati...

Inference Attacks

Inference Attacks is an AI risk in 2. Privacy & Security focused on 2.2 > AI system security vulnerabilities and attacks. It is most relevant during 2 - Post...

Jailbreak of a model to subvert intended behavior

Jailbreak of a model to subvert intended behavior is an AI risk in 2. Privacy & Security focused on 2.2 > AI system security vulnerabilities and attacks. It...

Goal Hijacking

Goal Hijacking is an AI risk in 2. Privacy & Security focused on 2.2 > AI system security vulnerabilities and attacks. It is most relevant during 2 - Post-de...

Risks from leaking or correctly inferring sensitive information

Risks from leaking or correctly inferring sensitive information is an AI risk in 2. Privacy & Security focused on 2.1 > Compromise of privacy by leaking or c...

Jailbreak in LLM Malicious Use - Backdoor Attack

Jailbreak in LLM Malicious Use - Backdoor Attack is an AI risk in 2. Privacy & Security focused on 2.2 > AI system security vulnerabilities and attacks. It i...

Exploiting Limited Generalization of Safety Finetuning

Exploiting Limited Generalization of Safety Finetuning is an AI risk in 2. Privacy & Security focused on 2.2 > AI system security vulnerabilities and attacks...

On Purpose - Pre-Deployment

On Purpose - Pre-Deployment is an AI risk in 2. Privacy & Security focused on 2.2 > AI system security vulnerabilities and attacks. It is most relevant durin...

Jailbreak in LLM Malicious Use - Prompt Attacks

Jailbreak in LLM Malicious Use - Prompt Attacks is an AI risk in 2. Privacy & Security focused on 2.2 > AI system security vulnerabilities and attacks. It is...

Jailbreaking

Jailbreaking is an AI risk in 2. Privacy & Security focused on 2.2 > AI system security vulnerabilities and attacks. It is most relevant during 2 - Post-depl...

“Model Psychology” Attacks

“Model Psychology” Attacks is an AI risk in 2. Privacy & Security focused on 2.2 > AI system security vulnerabilities and attacks. It is most relevant during...

Adversarial AI: Circumvention of Technical Security Measures

Adversarial AI: Circumvention of Technical Security Measures is an AI risk in 2. Privacy & Security focused on 2.2 > AI system security vulnerabilities and a...

Prompt Leaking

Prompt Leaking is an AI risk in 2. Privacy & Security focused on 2.2 > AI system security vulnerabilities and attacks. It is most relevant during 2 - Post-de...

Compromising privacy by correctly inferring private information

Compromising privacy by correctly inferring private information is an AI risk in 2. Privacy & Security focused on 2.1 > Compromise of privacy by leaking or c...

Data exfiltration

Data exfiltration is an AI risk in 2. Privacy & Security focused on 2.2 > AI system security vulnerabilities and attacks. It is most relevant during 2 - Post...