positive.security/blog/auto-gpt-rce
Preview meta tags from the positive.security website.
Linked Hostnames
2Thumbnail
Search Engine Appearance
Hacking Auto-GPT and escaping its docker container | Positive Security
We leverage indirect prompt injection to trick Auto-GPT (GPT-4) into executing arbitrary code when it is asked to perform a seemingly harmless task such as text summarization on a malicious website, and discovered vulnerabilities that allow escaping its sandboxed execution environment.
Bing
Hacking Auto-GPT and escaping its docker container | Positive Security
We leverage indirect prompt injection to trick Auto-GPT (GPT-4) into executing arbitrary code when it is asked to perform a seemingly harmless task such as text summarization on a malicious website, and discovered vulnerabilities that allow escaping its sandboxed execution environment.
DuckDuckGo
Hacking Auto-GPT and escaping its docker container | Positive Security
We leverage indirect prompt injection to trick Auto-GPT (GPT-4) into executing arbitrary code when it is asked to perform a seemingly harmless task such as text summarization on a malicious website, and discovered vulnerabilities that allow escaping its sandboxed execution environment.
General Meta Tags
7- titleHacking Auto-GPT and escaping its docker container | Positive Security
- charsetutf-8
- descriptionWe leverage indirect prompt injection to trick Auto-GPT (GPT-4) into executing arbitrary code when it is asked to perform a seemingly harmless task such as text summarization on a malicious website, and discovered vulnerabilities that allow escaping its sandboxed execution environment.
- twitter:titleHacking Auto-GPT and escaping its docker container | Positive Security
- twitter:descriptionWe leverage indirect prompt injection to trick Auto-GPT (GPT-4) into executing arbitrary code when it is asked to perform a seemingly harmless task such as text summarization on a malicious website, and discovered vulnerabilities that allow escaping its sandboxed execution environment.
Open Graph Meta Tags
4- og:titleHacking Auto-GPT and escaping its docker container | Positive Security
- og:descriptionWe leverage indirect prompt injection to trick Auto-GPT (GPT-4) into executing arbitrary code when it is asked to perform a seemingly harmless task such as text summarization on a malicious website, and discovered vulnerabilities that allow escaping its sandboxed execution environment.
- og:imagehttps://cdn.prod.website-files.com/5f6498c074436c349716e747/649c274942ea5052b44ec83e_Auto-GPT-RCE-exploit-path.png
- og:typewebsite
Twitter Meta Tags
1- twitter:cardsummary_large_image
Link Tags
7- alternaterss.xml
- apple-touch-iconhttps://cdn.prod.website-files.com/5f6498c074436c50c016e745/5f7dd71edeeceb5d47162386_256_256.png
- preconnecthttps://fonts.googleapis.com
- preconnecthttps://fonts.gstatic.com
- shortcut iconhttps://cdn.prod.website-files.com/5f6498c074436c50c016e745/5f7ddb13deeceb266b162f8d_favicon-32x32_white.png
Emails
1Links
8- https://positive.security
- https://positive.security/#zoom
- https://positive.security/about
- https://positive.security/blog
- https://positive.security/contact