Skip to content

Commit de65c96

Browse files
committed
Redirections and Bug fixed
1 parent 27e027b commit de65c96

File tree

2 files changed

+21
-1
lines changed

2 files changed

+21
-1
lines changed

.openpublishing.redirection.json

Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -41020,6 +41020,26 @@
4102041020
"source_path": "learn-pr/wwl-azure/create-plugins-semantic-kernel/8-exercise-save-prompts-files.md",
4102141021
"redirect_url": "/training/modules/create-plugins-semantic-kernel/",
4102241022
"redirect_document_id": false
41023+
},
41024+
{
41025+
"source_path": "learn-pr/wwl-azure/combine-prompts-functions/2-call-functions-within-prompts.md",
41026+
"redirect_url": "/training/modules/combine-prompts-functions/",
41027+
"redirect_document_id": false
41028+
},
41029+
{
41030+
"source_path": "learn-pr/wwl-azure/combine-prompts-functions/3-exercise-use-nested-functions-song-suggestions.md",
41031+
"redirect_url": "/training/modules/combine-prompts-functions/",
41032+
"redirect_document_id": false
41033+
},
41034+
{
41035+
"source_path": "learn-pr/wwl-azure/combine-prompts-functions/4-knowledge-check.md",
41036+
"redirect_url": "/training/modules/combine-prompts-functions/",
41037+
"redirect_document_id": false
41038+
},
41039+
{
41040+
"source_path": "learn-pr/wwl-azure/combine-prompts-functions/5-summary.md",
41041+
"redirect_url": "/training/modules/combine-prompts-functions/7-summary",
41042+
"redirect_document_id": false
4102341043
}
4102441044
]
4102541045
}

learn-pr/wwl-azure/combine-prompts-functions/includes/2-understand-prompt-injections.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -80,7 +80,7 @@ var expected =
8080
""";
8181
```
8282

83-
This example illustrates how user input could attempt to exploit a prompt template. By injecting XML content into the input placeholder, an attacker can manipulate the structure of the rendered prompt. In this example, the malicious input prematurely closes the <message> tag and inserts an unauthorized system message, demonstrating a vulnerability that can lead to unintended behavior or security risks in applications relying on dynamic prompts. However, the attack is prevented by the Semantic Kernel's automatic HTML encoding. The actual prompt is rendered as follows:
83+
This example illustrates how user input could attempt to exploit a prompt template. By injecting XML content into the input placeholder, an attacker can manipulate the structure of the rendered prompt. In this example, the malicious input prematurely closes the `<message>` tag and inserts an unauthorized system message, demonstrating a vulnerability that can lead to unintended behavior or security risks in applications relying on dynamic prompts. However, the attack is prevented by the Semantic Kernel's automatic HTML encoding. The actual prompt is rendered as follows:
8484

8585
```output
8686
<message role='system'>This is the system message</message>

0 commit comments

Comments
 (0)