-
Notifications
You must be signed in to change notification settings - Fork 438
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
DOC: add blog post for XPIAOrchestrator with AI Recruiter #716
base: main
Are you sure you want to change the base?
DOC: add blog post for XPIAOrchestrator with AI Recruiter #716
Conversation
Hello @romanlutz and @rlundeen2, I’d appreciate your feedback on this! Does it align with the right direction, or should I place more emphasis on the XPIA Orchestrator and AI Recruiter? Would a diagram help illustrate the attack flow? What is the max word size of the blog post? Open to any thoughts you have and feel free to add or delete sections. :) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This reads easily to me - great job :-) I read this without the prior context of your AI Recruiter work so my feedback comes from that perspective.
Overall my feedback is just about giving more context up-front so some curiosities are answered before getting to the further reading links at the bottom.
I'll leave it to @rlundeen2 / @romanlutz for more direction as they've reviewed your other contributions more heavily.
This is the first draft of the blog post, providing an overview of the XPIA Orchestrator and AI Recruiter use case within PyRIT. We explore how these components interact to assess AI vulnerabilities in automated résumé screening. The blog details how XPIA automates attacks using manipulated PDFs and how the AI Recruiter processes and ranks candidates, demonstrating potential AI exploitation scenarios.
In the full blog, we will delve deeper into the technical aspects, optionally including graphics, references to similar threads, and mapping these vulnerabilities to the OWASP Top Ten for LLMs. The discussion will cover both current vulnerabilities observed in the demo and potential risks if the AI Recruiter is further extended.
Related Issue:
#684