PromptRiskDBThreat intelligence atlas
AI Risk

Creating avenues for exploiting user trust, nudging or manipulation

"In conversation, users may reveal private information that would otherwise be difficult to access, such as thoughts, opinions, or emotions. Capturing such information may enable downstream applications that violate privacy rights or cause harm to users, such as via surveillance or the creation of addictive applications."

AI Risk5. Human-Computer Interaction5.1 > Overreliance and unsafe use2 - Post-deployment

Record summary

A quick snapshot of what this page covers.

Techniques11Attack methods connected to this risk.
Mitigations22Defenses that may help with related attacks.
Domain5. Human-Computer InteractionThe broad risk area this belongs to.

Risk profile

How this risk is described and categorized.

Domain5. Human-Computer Interaction
Subdomain5.1 > Overreliance and unsafe use
Entity3 - Other
Intent2 - Unintentional
Timing2 - Post-deployment
CategoryHuman-Computer Interaction Harms
SubcategoryCreating avenues for exploiting user trust, nudging or manipulation

Suggested mitigations

Defenses that may help with related attacks.

User Training

Business and Data UnderstandingData Preparation+4 more
LifecycleBusiness and Data Understanding + 5 moreCategoryPolicy

Deepfake Detection

DeploymentMonitoring and Maintenance+2 more
LifecycleDeployment + 3 moreCategoryTechnical - ML

AI Telemetry Logging

DeploymentMonitoring and Maintenance
LifecycleDeployment + 1 moreCategoryTechnical - Cyber

Generative AI Guardrails

ML Model EngineeringML Model Evaluation+1 more
LifecycleML Model Engineering + 2 moreCategoryTechnical - ML

Generative AI Guidelines

ML Model EngineeringML Model Evaluation+1 more
LifecycleML Model Engineering + 2 moreCategoryTechnical - ML

Verify AI Artifacts

Business and Data UnderstandingData Preparation+1 more
LifecycleBusiness and Data Understanding + 2 moreCategoryTechnical - Cyber

Vulnerability Scanning

ML Model EngineeringData Preparation
LifecycleML Model Engineering + 1 moreCategoryTechnical - Cyber

AI Bill of Materials

Business and Data UnderstandingData Preparation+1 more
LifecycleBusiness and Data Understanding + 2 moreCategoryPolicy

Source

Research source for this risk, when available.