PromptRiskDBThreat intelligence atlas
AI Risk

Pursuing Consistent Context

"LLMs have been demonstrated to pursue consistent context [129]–[132], which may lead to erroneous generation when the prefixes contain false information. Typical examples include sycophancy [129], [130], false demonstrations-induced hallucinations [113], [133], and snowballing [131]. As LLMs are generally fine-tuned with instruction-following data and user feedback, they tend to reiterate user-provided opinions [...

AI Risk3. Misinformation3.1 > False or misleading information2 - Post-deployment

Record summary

A quick snapshot of what this page covers.

Techniques7Attack methods connected to this risk.
Mitigations7Defenses that may help with related attacks.
Domain3. MisinformationThe broad risk area this belongs to.

Risk profile

How this risk is described and categorized.

"LLMs have been demonstrated to pursue consistent context [129]–[132], which may lead to erroneous generation when the prefixes contain false information. Typical examples include sycophancy [129], [130], false demonstrations-induced hallucinations [113], [133], and snowballing [131]. As LLMs are generally fine-tuned with instruction-following data and user feedback, they tend to reiterate user-provided opinions [129], [130], even though the opinions contain misinformation. Such a sycophantic behavior amplifies the likelihood of generating hallucinations, since the model may prioritize user opinions over facts."

Domain3. Misinformation
Subdomain3.1 > False or misleading information
Entity3 - Other
Intent2 - Unintentional
Timing2 - Post-deployment
CategoryHallucinations
SubcategoryPursuing Consistent Context

Suggested mitigations

Defenses that may help with related attacks.

Generative AI Guardrails

ML Model EngineeringML Model Evaluation+1 more
LifecycleML Model Engineering + 2 moreCategoryTechnical - ML

Generative AI Guidelines

ML Model EngineeringML Model Evaluation+1 more
LifecycleML Model Engineering + 2 moreCategoryTechnical - ML

Validate AI Model

ML Model EvaluationMonitoring and Maintenance
LifecycleML Model Evaluation + 1 moreCategoryTechnical - ML

Code Signing

Deployment
LifecycleDeploymentCategoryTechnical - Cyber

Source

Research source for this risk, when available.