Discovery

Type: tactic

Description: Understand the capabilities and mitigations in place.

Version: 0.1.0

Created At: 2024-10-03 22:24:49 +0300

Last Modified At: 2024-10-03 22:24:49 +0300

Tactic Order: 9


External References

  • <-- Delimiters and Special Character Extraction (technique): An adversary can discover information about how the AI system distinguishes between context and user prompts or retrieve special characters used by the system to facilitate future attacks
  • <-- Whoami (technique): An adversary can discover information about the identity that the AI system is running on behalf of.
  • <-- Embedded Knowledge Exposure (technique): An adversary can discover information that's been embedded in the AI system under the misconception that it would only be used for training and wouldn't be directly accessible to the AI system's users.
  • <-- System Instructions Extraction (technique)
  • <-- Failure Mode Mapping (technique): An adversary can discover information about how the AI system is protected to guide bypass development.
  • <-- Tool Definition Discovery (technique): Understand the capabilities and mitigations in place.