Thursday, November 14, 2024

Invicti's Web Application Security Blog Updates for 14 Nov 2024

View this email in your browser

Weekly Update – 14 Nov 2024


System prompt exposure: How AI image generators may leak sensitive instructions


Recraft's image generation service could leak its internal system prompts due to its unique architecture combining Claude (an AI language model) with a diffusion model. Unlike other image generators, Recraft could perform calculations and answer questions, which led to the discovery that carefully crafted prompts could expose the system's internal instructions.

The post System prompt exposure: How AI image generators may leak sensitive instructions appeared first on Invicti.


 

Doubling down on components: SCA and Container Security on the Invicti platform


Supply chain security is a critical part of any AppSec program. The addition of software composition analysis (SCA) and Container Security to existing dynamic SCA on the Invicti platform creates a unique static+dynamic combo to crack down on insecure web application components.

The post Doubling down on components: SCA and Container Security on the Invicti platform appeared first on Invicti.


 

More Recent Articles

Cache bypass techniques for time-based SQL injection
Invicti Security Appoints Kevin Gallagher as President
Analyzing WordPress hack access logs with NotebookLM
3 AppSec headaches you can cure with Predictive Risk Scoring
Top 5 injection attacks in application security
Twitter
Facebook
LinkedIn
Website
Copyright © 2024 Invicti, All rights reserved.
You are receiving this email because you opted in as a Blog Subscribers.

                                                                        Invicti Security Corp
1000 N Lamar Blvd Suite 300, Austin, TX 78703, United States

Want to change how you receive these emails?
You can update your preferences or unsubscribe from this list

No comments:

Post a Comment