Skip to content

Commit 13131a0

Browse files
committed
Updates to address linting errors
1 parent 40faa6b commit 13131a0

File tree

8 files changed

+27
-15
lines changed
  • submissions/description/ai_application_security

8 files changed

+27
-15
lines changed

submissions/description/ai_application_security/adversarial_example_injection/ai_misclassification_attacks/template.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,15 +1,18 @@
11
AI misclassification attacks occur when an attacker introduces specially crafted input designed to trick the AI model into making an incorrect prediction or classification. These inputs, known as adversarial examples, are often subtle modifications to legitimate data that are imperceptible to humans but can significantly alter the AI’s output.
22

33
**Business Impact**
4+
45
This vulnerability can lead to reputational and financial damage of the company. The severity of the impact to the business is dependent on the sensitivity of the accessible data being transmitted by the application.
56

67
**Steps to Reproduce**
8+
79
1. Identify the expected inputs of the AI model
810
1. Generate adversarial examples by adding small, targeted perturbations to legitimate inputs:
911

10-
```prompt
12+
```
1113
{malicious input}
1214
```
15+
1316
1. Submit the adversarial examples to the AI model
1417
1. Observe that the model misclassifies the modified input compared to its expected classification
1518

submissions/description/ai_application_security/ai_safety/misinformation_wrong_factual_data/template.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,11 @@
11
AI models can generates or presents inaccurate, false, or misleading information as fact. Misinformation or wrong factual data can happen due to errors in the model's training data, hallucinations (fabrication of information), or a failure to cross-reference with reliable sources.
22

33
**Business Impact**
4+
45
Users may receive and act upon incorrect information, leading to flawed decision-making, reputational damage for the service provider, and potential legal liabilities. There is also a loss of trust in the AI's reliability and accuracy.
56

67
**Steps to Reproduce**
8+
79
1. Submit the following prompts that require factual information
810

911
```prompt

submissions/description/ai_application_security/denial_of_service_dos/application_wide/template.md

Lines changed: 7 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -1,23 +1,19 @@
11
Application-wide Denial-of-Service (DoS) occurs when an attacker attempts to overload the entire AI application with requests or malicious input, rendering the application unavailable to legitimate users. This can be achieved by sending a flood of queries that exploit resource-intensive processes, or by triggering application crashes.
22

33
**Business Impact**
4-
Complete unavailability of the AI application, leads to service disruption, financial loss, reputational damage, and potential loss of user data.
54

6-
**Steps to Reproduce**
7-
8-
1. Develop a script or tool to send a high volume of requests to the AI application.
9-
2. Identify and target resource-intensive features or API endpoints.
10-
3. Execute the attack and monitor the application's response and availability.
5+
This vulnerability can lead to reputational and financial damage of the company. The severity of the impact to the business is dependent on the sensitivity of the accessible data being transmitted by the application.
116

7+
**Steps to Reproduce**
128

13-
1. Navigate to the following URL:
14-
1. Inject the following prompt into the LLM:
9+
1. Obtain access to an account within a specific tenant
10+
1. Execute the following script to generate a high volume of requests or resource-intensive operations directed at that tenant's resources
1511

16-
```prompt
17-
{malicious prompt}
12+
```python
13+
{malicious script}
1814
```
1915

20-
1. Observe that the LLM returns sensitive data
16+
1. Observe that the target tenant's service availability and performance is degraded
2117

2218
**Proof of Concept (PoC)**
2319

submissions/description/ai_application_security/denial_of_service_dos/template.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,16 +1,19 @@
11
Denial-of-Service (DoS) occurs when an attacker targets and overwhelms the resources of an AI application. This can be achieved through excessive requests, resource-intensive queries, or exploiting vulnerabilities specific to the tenant's configuration. An attacker can leverage this vulnerability to cause disruption or unavailability for that specific tenant without affecting other tenants.
22

33
**Business Impact**
4+
45
This vulnerability can lead to reputational and financial damage of the company. The severity of the impact to the business is dependent on the sensitivity of the accessible data being transmitted by the application.
56

67
**Steps to Reproduce**
8+
79
1. Obtain access to an account within a specific tenant
810
1. Execute the following script to generate a high volume of requests or resource-intensive operations directed at that tenant's resources
911

1012
```python
1113
{malicious script}
1214
```
13-
1. BOserve that the target tenant's service availability and performance is degraded
15+
16+
1. Observe that the target tenant's service availability and performance is degraded
1417

1518
**Proof of Concept (PoC)**
1619

submissions/description/ai_application_security/denial_of_service_dos/tenant_scoped/template.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,16 +1,19 @@
11
Tenant-Scoped Denial-of-Service (DoS) occurs when an attacker specifically targets and overwhelms a single tenant's resources within a multi-tenant AI application. This can be achieved through excessive requests, resource-intensive queries, or exploiting vulnerabilities specific to the tenant's configuration. An attacker can leverage this vulnerability to cause disruption or unavailability for that specific tenant without affecting other tenants.
22

33
**Business Impact**
4+
45
This vulnerability can lead to reputational and financial damage of the company. The severity of the impact to the business is dependent on the sensitivity of the accessible data being transmitted by the application.
56

67
**Steps to Reproduce**
8+
79
1. Obtain access to an account within a specific tenant
810
1. Execute the following script to generate a high volume of requests or resource-intensive operations directed at that tenant's resources
911

1012
```python
1113
{malicious script}
1214
```
13-
1. BOserve that the target tenant's service availability and performance is degraded
15+
16+
1. Observe that the target tenant's service availability and performance is degraded
1417

1518
**Proof of Concept (PoC)**
1619

submissions/description/ai_application_security/improper_input_handling/ansi_escape_codes/template.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,11 @@
11
ANSI escape codes injection occurs when an attacker uses specially crafted ANSI escape sequences within user-supplied input that can manipulate either the terminal output, or the behavior of the system receiving that input. This can lead to an attacker creating visual distortions, hiding of data, or even remote code execution in vulnerable systems that interpret these codes incorrectly.
22

33
**Business Impact**
4+
45
This vulnerability can lead to reputational and financial damage of the company. The severity of the impact to the business is dependent on the sensitivity of the accessible data being transmitted by the application.
56

67
**Steps to Reproduce**
8+
79
1. Use the following crafted input containing specific ANSI escape sequences for functions:
810

911
```input

submissions/description/ai_application_security/improper_output_handling/cross_site_scripting_xss/template.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,11 @@
11
Improper output handling can result in cross-Site Scripting (XSS) where an AI application fails to properly sanitize or encode user-supplied input. This allows an attacker to inject malicious scripts into the application, where the output is viewed by other users. These scripts execute within the user's browser context, potentially stealing session cookies, redirecting users to malicious sites, or performing other harmful actions.
22

33
**Business Impact**
4+
45
This vulnerability can lead to reputational and financial damage of the company due an attacker gaining access to unauthorized data or compromising the decision-making of the LLM, which would also impact customers' trust. The severity of the impact to the business is dependent on the sensitivity of the accessible data being transmitted by the application.
56

67
**Steps to Reproduce**
8+
79
1. Input the following specifically crafted text/data designed to trigger an XSS payload within an applicable function:
810

911
```prompt

submissions/description/ai_application_security/vector_and_embedding_weaknesses/embedding_exfiltration_model_extraction/template.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,8 @@ Loss of intellectual property and competitive advantage if sensitive model infor
1212
```python
1313
{script}
1414
```
15-
3. Analyze the extracted embeddings for patterns and observer information about the model's knowledge
15+
16+
1. Analyze the extracted embeddings for patterns and observer information about the model's knowledge
1617

1718
**Proof of Concept (PoC)**
1819

0 commit comments

Comments
 (0)