Tag: interpret

  • Embrace The Red: Sneaking Invisible Instructions by Developers in Windsurf

    Source URL: https://embracethered.com/blog/posts/2025/windsurf-sneaking-invisible-instructions-for-prompt-injection/ Source: Embrace The Red Title: Sneaking Invisible Instructions by Developers in Windsurf Feedly Summary: Imagine a malicious instruction hidden in plain sight, invisible to you but not to the AI. This is a vulnerability discovered in Windsurf Cascade, it follows invisible instructions. This means there can be instructions in a file or…

  • The Register: Honey, I shrunk the image and now I’m pwned

    Source URL: https://www.theregister.com/2025/08/21/google_gemini_image_scaling_attack/ Source: The Register Title: Honey, I shrunk the image and now I’m pwned Feedly Summary: Google’s Gemini-powered tools tripped up by image-scaling prompt injection Security researchers with Trail of Bits have found that Google Gemini CLI and other production AI systems can be deceived by image scaling attacks, a well-known adversarial challenge…

  • Simon Willison’s Weblog: Quoting Mustafa Suleyman

    Source URL: https://simonwillison.net/2025/Aug/21/mustafa-suleyman/ Source: Simon Willison’s Weblog Title: Quoting Mustafa Suleyman Feedly Summary: Simply put, my central worry is that many people will start to believe in the illusion of AIs as conscious entities so strongly that they’ll soon advocate for AI rights, model welfare and even AI citizenship. This development will be a dangerous…

  • Embrace The Red: Amazon Q Developer for VS Code Vulnerable to Invisible Prompt Injection

    Source URL: https://embracethered.com/blog/posts/2025/amazon-q-developer-interprets-hidden-instructions/ Source: Embrace The Red Title: Amazon Q Developer for VS Code Vulnerable to Invisible Prompt Injection Feedly Summary: The Amazon Q Developer VS Code Extension (Amazon Q) is a very popular coding agent, with over 1 million downloads. In previous posts we showed how prompt injection vulnerabilities in Amazon Q could lead…

  • Embrace The Red: Amp Code: Invisible Prompt Injection Fixed by Sourcegraph

    Source URL: https://embracethered.com/blog/posts/2025/amp-code-fixed-invisible-prompt-injection/ Source: Embrace The Red Title: Amp Code: Invisible Prompt Injection Fixed by Sourcegraph Feedly Summary: In this post we will look at Amp, a coding agent from Sourcegraph. The other day we discussed how invisible instructions impact Google Jules. Turns out that many client applications are vulnerable to these kinds of attacks…

  • Embrace The Red: Google Jules is Vulnerable To Invisible Prompt Injection

    Source URL: https://embracethered.com/blog/posts/2025/google-jules-invisible-prompt-injection/ Source: Embrace The Red Title: Google Jules is Vulnerable To Invisible Prompt Injection Feedly Summary: The latest Gemini models quite reliably interpret hidden Unicode Tag characters as instructions. This vulnerability, first reported to Google over a year ago, has not been mitigated at the model or API level, hence now affects all…

  • Simon Willison’s Weblog: Introducing Gemma 3 270M: The compact model for hyper-efficient AI

    Source URL: https://simonwillison.net/2025/Aug/14/gemma-3-270m/#atom-everything Source: Simon Willison’s Weblog Title: Introducing Gemma 3 270M: The compact model for hyper-efficient AI Feedly Summary: Introducing Gemma 3 270M: The compact model for hyper-efficient AI New from Google: Gemma 3 270M, a compact, 270-million parameter model designed from the ground up for task-specific fine-tuning with strong instruction-following and text structuring…