Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I find this interesting. I have tools that attempt to reverse engineer black box models through auto-prompting and analysis of the outputs/tokens. I have used this to develop prompt injection attacks that "steer" output, but have never tried to use the data to recreate an exact input...


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: