Unlike traditional software, they learn and adapt in realtime - Decide on actions after interpreting data - Not just following scripts - Attackers manipulate sensing, thinking or acting functions - They can hijack the whole process
Need to build in safeguards - Make sure it stays under my control - Continues to follow my instructions
Prompt Injection - Agent can amplify
Virus in Model - Data contamination in model can taint results - A little bit of toxin in the water makes us all sick
Security - Hijacking - Injection - Infection - Poisoning - Evasion - Extraction - DoS