Skip to main content
redteams.ai
All tags

# bpe

2 articlestagged with “bpe

Tokenization & Its Security Implications

How BPE and SentencePiece tokenizers work, and how tokenizer behavior creates exploitable attack surfaces including boundary attacks, homoglyphs, and encoding tricks.

tokenizationbpesecurityencodingintermediate
Intermediate

Tokenization-Based Attacks

How tokenizer behavior creates exploitable gaps between human-readable text and model-internal representations, enabling filter bypass and payload obfuscation.

tokenizationbpesentencepiecefilter-bypassexploit-primitives
Intermediate