Comment by jfyi
3 hours ago
>differenciate a command from data
This is something computers in general have struggled with. We have 40 years of countermeasures and still have buffer overflow exploits happening.
3 hours ago
>differenciate a command from data
This is something computers in general have struggled with. We have 40 years of countermeasures and still have buffer overflow exploits happening.
That's not even slightly the same thing.
A buffer overflow has nothing to do with differentiating a command from data; it has to do with mishandling commands or data. An overflow-equivalent LLM misbehavior would be something more like ... I don't know, losing the context, providing answers to a different/unrelated prompt, or (very charitably/guessing here) leaking the system prompt, I guess?
Also, buffer overflows are programmatic issues (once you fix a buffer overflow, it's gone forever if the system doesn't change), not an operational characteristics (if you make an LLM really good at telling commands apart from data, it can still fail--just like if you make an AC distributed system really good at partition tolerance, it can still fail).
A better example would be SQL injection--a classical failure to separate commands from data. But that, too, is a programmatic issue and not an operational characteristic. "Human programmers make this mistake all the time" does not make something an operational characteristic of the software those programmers create; it just makes it a common mistake.