1. Hunting for prompts and API keys works, but it is a brittle detection. Eventually adversaries will move to proxy services that provide some level of obfuscation. What do we do then?
1. Hunting for prompts and API keys works, but it is a brittle detection. Eventually adversaries will move to proxy services that provide some level of obfuscation. What do we do then?
That aligns with current LLM capabilities in software development and how they’re deployed.
That aligns with current LLM capabilities in software development and how they’re deployed.