← Back to context

Comment by ArcHound

3 days ago

I recall that. In this case, you have only A and B and yet, all of your secrets are in the hands of an attacker.

It's great start, but not nearly enough.

EDIT: right, when we bundle state with external Comms, we have all three indeed. I missed that too.

Not exactly. Step E in the blog post:

> Gemini exfiltrates the data via the browser subagent: Gemini invokes a browser subagent per the prompt injection, instructing the subagent to open the dangerous URL that contains the user's credentials.

fulfills the requirements for being able to change external state

  • I disagree. No state "owned" by LLM changed, it only sent a request to the internet like any other.

    EDIT: In other words, the LLM didn't change any state it has access to.

    To stretch this further - clicking on search results changes the internal state of Google. Would you consider this ability of LLM to be state-changing? Where would you draw the line?

    • [EDIT]

      I should have included the full C option:

      Change state or communicate externally. The ability to call `cat` and then read results would "activate" the C option in my opinion.

What do you mean? The last part in this case is also present, you can change external state by sending a request with the captured content.