LLM03:2023 - Inadequate Sandboxing

Description:
Inadequate sandboxing occurs when an LLM is not properly isolated when it has access to external resources or sensitive systems. This can lead to potential exploitation, unauthorized access, or unintended actions by the LLM.

Common Inadequate Sandboxing Vulnerabilities:

How to Prevent:

Example Attack Scenarios: Scenario #1: An attacker exploits an LLM’s access to a sensitive database by crafting prompts that instruct the LLM to extract and reveal confidential information.

Scenario #2: The LLM is allowed to perform system-level actions, and an attacker manipulates it into executing unauthorized commands on the underlying system.

By understanding and addressing the risks associated with inadequate sandboxing, developers can better protect their LLM implementations and ensure the safety and security of their systems.