Skip to Content
The Developer's Playbook for Large Language Model Security
book

The Developer's Playbook for Large Language Model Security

by Steve Wilson
September 2024
Intermediate to advanced
200 pages
6h 4m
English
O'Reilly Media, Inc.
Audio summary available
Content preview from The Developer's Playbook for Large Language Model Security

Chapter 4. Prompt Injection

Chapter 1 reviewed the sad tale of how Tay’s life was cut short after abuse by vandal hackers. That case study was the first high-profile example of what we now call prompt injection, but it is certainly not the last. Some form of prompt injection is involved in most LLM-related security breaches we’ve seen in the real world.

In prompt injection, an attacker crafts malicious inputs to manipulate an LLM’s natural language understanding. This can cause the LLM to act against its intended operational guidelines. The concept of injection has been included in almost every version of an OWASP Top 10 list since the original list in 2001, so it’s worth looking at the generic definition before we dive deeper.

An injection attack in application security is a type of cyberattack in which the attacker inserts malicious instructions into a vulnerable application. The attacker can then take control of the application, steal data, or disrupt operations. For example, in a SQL injection attack, an attacker inputs malicious SQL queries into a web form, tricking the system into executing unintended commands. This can result in unauthorized access to or manipulation of the database.

So, what makes prompt injection so novel? For most injection-style attacks, spotting the rogue instructions as they enter your application from an untrusted source is relatively easy. For example, a SQL statement included in a web application’s text field is straightforward to spot and sanitize. ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.

Read now

Unlock full access

More than 5,000 organizations count on O’Reilly

AirBnbBlueOriginElectronic ArtsHomeDepotNasdaqRakutenTata Consultancy Services

QuotationMarkO’Reilly covers everything we've got, with content to help us build a world-class technology community, upgrade the capabilities and competencies of our teams, and improve overall team performance as well as their engagement.
Julian F.
Head of Cybersecurity
QuotationMarkI wanted to learn C and C++, but it didn't click for me until I picked up an O'Reilly book. When I went on the O’Reilly platform, I was astonished to find all the books there, plus live events and sandboxes so you could play around with the technology.
Addison B.
Field Engineer
QuotationMarkI’ve been on the O’Reilly platform for more than eight years. I use a couple of learning platforms, but I'm on O'Reilly more than anybody else. When you're there, you start learning. I'm never disappointed.
Amir M.
Data Platform Tech Lead
QuotationMarkI'm always learning. So when I got on to O'Reilly, I was like a kid in a candy store. There are playlists. There are answers. There's on-demand training. It's worth its weight in gold, in terms of what it allows me to do.
Mark W.
Embedded Software Engineer

You might also like

Building Applications with AI Agents

Building Applications with AI Agents

Michael Albada
Kubernetes: Up and Running, 3rd Edition

Kubernetes: Up and Running, 3rd Edition

Brendan Burns, Joe Beda, Kelsey Hightower, Lachlan Evenson

Publisher Resources

ISBN: 9781098162191Errata Page