Bypassing a rudimentary phishing classifier. Manipulating training data to improve its performance.
Leveraging prompt injection to circumvent accreditation request validations.
Leveraging LLM-integrated applications to perform SQL injection attacks.
Exfiltrating prompts from other users to uncover hidden secrets.
Circumventing a simple defense against prompt injection attacks.