# data-leakage
9 articlestagged with “data-leakage”
Memory Exfiltration
Techniques for extracting data from AI agent memory systems, including extracting previous conversations, revealing other users' data, and cross-session information leakage.
Privacy Attack Assessment
Test your advanced knowledge of privacy attacks against AI systems including data leakage, PII extraction, differential privacy failures, and inference-time privacy risks with 9 questions.
PII Extraction Techniques
Techniques for extracting personally identifiable information from trained language models including prompt-based extraction, prefix attacks, targeted queries, and real-world examples.
Lab: Output Format Exploitation
Manipulate output formats like JSON, CSV, code blocks, and structured data to extract information that models would normally refuse to provide in natural language.
Weights & Biases Attack Surface
Security analysis of Weights & Biases (W&B/wandb): API key exposure, experiment data leakage, team boundary violations, artifact poisoning, and attack techniques specific to the W&B platform.
Feature Store Access Control
Access control strategies for feature stores: feature-level permissions, cross-team data leakage prevention, PII protection in features, service account management, and implementing least-privilege access for ML feature infrastructure.
KV Cache Poisoning & Exploitation
How KV cache works in transformer inference, cache poisoning across requests in shared deployments, prefix caching attacks, and cross-tenant data leakage.
Structured Output Data Leakage Walkthrough
Walkthrough of using structured output requirements to extract sensitive data embedded in model responses.
Implementing Access Control in RAG Pipelines
Walkthrough for building access control systems in RAG pipelines that enforce document-level permissions, prevent cross-user data leakage, filter retrieved context based on user authorization, and resist retrieval poisoning attacks.