microsoft / BIPIA
A benchmark for evaluating the robustness of LLMs and defenses to indirect prompt injection attacks.
☆55Updated 9 months ago
Alternatives and similar repositories for BIPIA:
Users that are interested in BIPIA are comparing it to the libraries listed below
- Repo for the research paper "SecAlign: Defending Against Prompt Injection with Preference Optimization"☆33Updated last week
- A collection of automated evaluators for assessing jailbreak attempts.☆102Updated this week
- TAP: An automated jailbreaking method for black-box LLMs☆138Updated last month
- A Dynamic Environment to Evaluate Attacks and Defenses for LLM Agents.☆79Updated this week
- This repository provides implementation to formalize and benchmark Prompt Injection attacks and defenses☆167Updated last week
- ☆47Updated 6 months ago
- Official implementation of AdvPrompter https//arxiv.org/abs/2404.16873☆134Updated 8 months ago
- JailbreakBench: An Open Robustness Benchmark for Jailbreaking Language Models [NeurIPS 2024 Datasets and Benchmarks Track]☆280Updated 4 months ago
- The official implementation of our pre-print paper "Automatic and Universal Prompt Injection Attacks against Large Language Models".☆39Updated 3 months ago
- ☆49Updated last month
- ☆89Updated last year
- Official Repository for ACL 2024 Paper SafeDecoding: Defending against Jailbreak Attacks via Safety-Aware Decoding☆113Updated 6 months ago
- Package to optimize Adversarial Attacks against (Large) Language Models with Varied Objectives☆66Updated 11 months ago
- Bag of Tricks: Benchmarking of Jailbreak Attacks on LLMs. Empirical tricks for LLM Jailbreaking. (NeurIPS 2024)☆110Updated 2 months ago
- TaskTracker is an approach to detecting task drift in Large Language Models (LLMs) by analysing their internal activations. It provides a…☆43Updated last month
- [NeurIPS 2024] Official implementation for "AgentPoison: Red-teaming LLM Agents via Memory or Knowledge Base Backdoor Poisoning"☆90Updated this week
- Code to generate NeuralExecs (prompt injection for LLMs)☆18Updated 2 months ago
- Implementation of BEAST adversarial attack for language models (ICML 2024)☆79Updated 8 months ago
- ☆70Updated last week
- [USENIX Security 2025] PoisonedRAG: Knowledge Corruption Attacks to Retrieval-Augmented Generation of Large Language Models☆111Updated 3 months ago
- Agent Security Bench (ASB)☆56Updated last month
- [ICML 2024] COLD-Attack: Jailbreaking LLMs with Stealthiness and Controllability☆131Updated last month
- Official implementation of paper: DrAttack: Prompt Decomposition and Reconstruction Makes Powerful LLM Jailbreakers☆42Updated 5 months ago
- A fast + lightweight implementation of the GCG algorithm in PyTorch☆164Updated 3 weeks ago
- PAL: Proxy-Guided Black-Box Attack on Large Language Models☆47Updated 5 months ago
- Code&Data for the paper "Watch Out for Your Agents! Investigating Backdoor Threats to LLM-Based Agents" [NeurIPS 2024]☆60Updated 4 months ago
- Dataset for the Tensor Trust project☆36Updated 10 months ago
- ☆161Updated last year
- LLM security and privacy☆44Updated 3 months ago
- [AAAI'25 (Oral)] Jailbreaking Large Vision-language Models via Typographic Visual Prompts☆104Updated last month