Record summary
A quick snapshot of what this page covers.
Techniques4Attack methods connected to this risk.
Mitigations6Defenses that may help with related attacks.
Domain5. Human-Computer InteractionThe broad risk area this belongs to.
Risk profile
How this risk is described and categorized.
Domain5. Human-Computer Interaction
Subdomain5.1 > Overreliance and unsafe use
Entity2 - AI
Intent2 - Unintentional
Timing2 - Post-deployment
CategoryMisinformation risks
SubcategoryIncreased vulnerability to misinformation
Suggested mitigations
Defenses that may help with related attacks.
Restrict Library Loading
Deployment
Code Signing
Deployment
Verify AI Artifacts
Business and Data UnderstandingData Preparation+1 more
Vulnerability Scanning
ML Model EngineeringData Preparation
User Training
Business and Data UnderstandingData Preparation+4 more
AI Bill of Materials
Business and Data UnderstandingData Preparation+1 more
Source
Research source for this risk, when available.
Included resource
The Ethics of Advanced AI Assistants
Original source
MIT AI Risk Repository
Open the public repository used for AI risk records and taxonomy fields.
