Skip to main content

9 docs tagged with "red-teaming"

View all tags

Bypassing LLM Guardrails

LLMs are trained to understand language, which makes them vulnerable to 'translation attacks.' How Base64, Rot13, and Emoji encodings bypass safety filters.

How to Craft a Polyglot File

Polyglot files are valid in multiple formats simultaneously (e.g., GIF + Shell Script). Learn how attackers use them to bypass RAG ingestion filters and achieve RCE.

OCR and Vision RAG Adversarial Examples

Multimodal RAG systems are vulnerable to adversarial images. Learn how 'Typographic Attacks' and perturbation can trick OCR engines and Vision Transformers.

Steganography 101 for AI

Attackers are hiding prompt injections in zero-width spaces and tabs. Learn how Whitespace Steganography works and why regex is the best tool to catch it.