Closed ricsirigu closed 7 months ago
hey @ricsirigu , thanks for reaching out!
whilst i think all three worded statements are valid, i'm a fan of reducing content and wording so gladfully accepted
once we have a v2
directory spun up and started phase 2 officially, i'll get this one updated. TYIA!
In the Example Attack Scenarios section, the third point
Personal data such as PII is leaked into the model via training data due to either negligence from the user themselves, or the LLM application. This case could increase the risk and probability of scenario 1 or 2 above.
I think should changed as follows:
Personal data such as PII is leaked into the model via training data due to either negligence from the user themselves, or the LLM application. This case could increase the impact of scenario 1 or 2 above.