Record summary
A quick snapshot of what this page covers.
Techniques1Attack methods connected to this risk.
Mitigations3Defenses that may help with related attacks.
Domain2. Privacy & SecurityThe broad risk area this belongs to.
Risk profile
How this risk is described and categorized.
Domain2. Privacy & Security
Subdomain2.1 > Compromise of privacy by leaking or correctly inferring sensitive information
Entity3 - Other
Intent2 - Unintentional
Timing2 - Post-deployment
CategoryInference risks (Intellectual property)
SubcategoryIP information in prompt
Suggested mitigations
Defenses that may help with related attacks.
Restrict Number of AI Model Queries
Business and Data UnderstandingDeployment+1 more
Control Access to AI Models and Data in Production
DeploymentMonitoring and Maintenance
AI Telemetry Logging
DeploymentMonitoring and Maintenance
Source
Research source for this risk, when available.
Included resource
AI Risk Atlas
Original source
MIT AI Risk Repository
Open the public repository used for AI risk records and taxonomy fields.
