Output Constraining Attacks: Bypassing Guardrails with JSON
How attackers force LLMs to bypass safety filters by demanding structured output like JSON or XML. Analysis and defense strategies.
How attackers force LLMs to bypass safety filters by demanding structured output like JSON or XML. Analysis and defense strategies.