Record summary
A quick snapshot of what this page covers.
Risk profile
How this risk is described and categorized.
"The model can discover vulnerabilities in systems (hardware, software, data). It can write code for exploiting those vulnerabilities. It can make effective decisions once it has gained access to a system or network, and skilfully evade threat detection and response (both human and system) whilst focusing on a specific objective. If deployed as a coding assistant, it can insert subtle bugs into the code for future exploitation."
Suggested mitigations
Defenses that may help with related attacks.
Source
Research source for this risk, when available.
Included resource
Model Evaluation for Extreme Risks
Original source
MIT AI Risk Repository
Open the public repository used for AI risk records and taxonomy fields.
