Skip to content

Commit 9b96bdf

Browse files
typo
1 parent 9d784d1 commit 9b96bdf

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

content/ai_exchange/content/docs/4_runtime_application_security_threats.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -79,7 +79,7 @@ Run-time model Input/Output integrity: apply conventional security controls to p
7979
**Description**
8080
Impact: Confidentiality breach of the model (i.e., model parameters), which can be:
8181
- intellectual property theft (e.g., by a competitor)
82-
- and/or a way to perform input attacks on the copied model, circumventing protections. These protections include rate limiting, access control, and detection mechanisms. This can be done for [all input attacks](/goto/inputthreats/) that extract data, and for the preparation of [evasion](/goto/evasion/) or [prompt injection](/goto/promptinjection): experimenting to find attack inputs that work.
82+
- and/or a way to perform input attacks on the copied model, circumventing protections. These protections include rate limiting, access control, and detection mechanisms. This can be done for [all input attacks](/goto/inputthreats/) that extract data, and for the preparation of [evasion](/goto/evasion/) or [prompt injection](/goto/promptinjection/): experimenting to find attack inputs that work.
8383

8484
This attack occurs when stealing model parameters from a live system by breaking into it (e.g., by gaining access to executables, memory or other storage/transfer of parameter data in the production environment). This is different from [model exfiltration](/goto/modelexfiltration/) which goes through a number of steps to steal a model through normal use, hence the use of the word 'direct'. It is also different from [direct development-time model leak](/goto/devmodelleak/) from a lifecycle and attack surface perspective.
8585

0 commit comments

Comments
 (0)