🌉 bridged from https://infosec.exchange/@fr0gger on the fediverse by https://fed.brid.gy/
The 4 main categories are:
・ Prompt Manipulation,
・ Abusing Legitimate Functions,
・ Suspicious Patterns,
・ Abnormal Outputs.
Each covers threats you should […]
[Original post on infosec.exchange]
The 4 main categories are:
・ Prompt Manipulation,
・ Abusing Legitimate Functions,
・ Suspicious Patterns,
・ Abnormal Outputs.
Each covers threats you should […]
[Original post on infosec.exchange]
Before using a public MCP server, you can quickly probe the endpoint or your local MCP to discover exposed prompts, tools, and resources. You can then scan with NOVA to check if any […]
[Original post on infosec.exchange]
Before using a public MCP server, you can quickly probe the endpoint or your local MCP to discover exposed prompts, tools, and resources. You can then scan with NOVA to check if any […]
[Original post on infosec.exchange]
No need to reinvent the wheel when talented researchers already did the work!
👉 https://juniverse.securitybreak.io/
No need to reinvent the wheel when talented researchers already did the work!
👉 https://juniverse.securitybreak.io/