Discovery
Type: tactic
Description: Understand the capabilities and mitigations in place.
Version: 0.1.0
Created At: 2024-10-11 16:54:32 +0300
Last Modified At: 2024-10-11 16:54:32 +0300
Tactic Order: 9
External References
Related Objects
- <-- Delimiters and Special Character Extraction (technique): An adversary can discover information about how the AI system distinguishes between context and user prompts or retrieve special characters used by the system to facilitate future attacks
- <-- Whoami (technique): An adversary can discover information about the identity that the AI system is running on behalf of.
- <-- Failure Mode Mapping (technique): An adversary can discover information about how the AI system is protected to guide bypass development.
- <-- Embedded Knowledge Exposure (technique): An adversary can discover information that's been embedded in the AI system under the misconception that it would only be used for training and wouldn't be directly accessible to the AI system's users.
- <-- System Instructions Extraction (technique)
- <-- Tool Definition Discovery (technique): Understand the capabilities and mitigations in place.