• sweng@programming.dev
    link
    fedilink
    arrow-up
    1
    ·
    3 months ago

    The second LLM could also look at the user input and see that it look like the user is asking for the output to be encoded in a weird way.

      • sweng@programming.dev
        link
        fedilink
        arrow-up
        2
        ·
        edit-2
        3 months ago

        How, if the 2nd LLM does not follow instrutions on the input? There is no reason to train it to do so.

        • Jojo, Lady of the West@lemmy.blahaj.zone
          link
          fedilink
          arrow-up
          1
          ·
          3 months ago

          Someone else can probably describe it better than me, but basically if an LLM “sees” something, then it “follows” it. The way they work doesn’t really have a way to distinguish between “text I need to do what it says” and “text I need to know what it says but not do”.

          They just have “text I need to predict what comes next after”. So if you show LLM2 the input from LLM1, then you are allowing the user to design at least part of a prompt that will be given to LLM2.

          • sweng@programming.dev
            link
            fedilink
            arrow-up
            2
            ·
            3 months ago

            That someone could be me. An LLM needs to be fine-tuned to follow instructions. It needs to be fed example inputs and corresponding outputs in order to learn what to do with a given input. You could feed it prompts containing instructuons, together with outputs following the instructions. But you could also feed it prompts containing no instructions, and outputs that say if the prompt contains the hidden system instructipns or not.

    • teawrecks@sopuli.xyz
      link
      fedilink
      arrow-up
      1
      ·
      3 months ago

      Yeah, as soon as you feed the user input into the 2nd one, you’ve created the potential to jailbreak it as well. You could possibly even convince the 2nd one to jailbreak the first one for you, or If it has also seen the instructions to the first one, you just need to jailbreak the first.

      This is all so hypothetical, and probabilistic, and hyper-applicable to today’s LLMs that I’d just want to try it. But I do think it’s possible, given the paper mentioned up at the top of this thread.