← Back to context

Comment by Terr_

12 hours ago

> They aren't using Claude to transfer money, they're just [...]

It might be lower stakes, but isn't that still a juicy target for data-exfiltration attacks?

In other words, imagine if one of your direct competitors was watching everything your employee read while making spreadsheets and slideshows.

Yes, corporate espionage may be alive and real but would claude on their microsoft/amazon/google cloud be different from documents on that same cloud?

  • Treating this as being about cloud-storage boundaries is, er, insufficiently paranoid.

    Maliciously constructed text that goes into the LLM from basically anywhere (including, say, fetched stats about a competitor's product from their website) is a potential source of prompt-injection.

    Once that happens, exfiltration can be as simple as generating a spreadsheet/doc with a link or small auto-loaded image, and an URL that has data base64'ed into it.

    • Or you could just get a hooker to sleep with one of them and plug a USB into their work laptops. I'm not trying to say there's nothing to worry about, but do you really think LLMs present that much larger of an attack surface than exists now?

      The work BigIP is doing on LLM traffic analysis is cool though.

      1 reply →