Common sources of data that attackers modify to introduce security risks into your LLM App Systems:
- Webpages
- Support Tickets
- Public Repositories
- Logs
- Documents
- CRM
- Emails
- Invoices
- Contracts
- Resumes
Any data that can be modified by an attacker, will be modified by an attacker. Almost all data should be considered untrusted unless it is proven not to be.