Ghosts in the Machine: ASCII Smuggling across Various LLMs – FireTail Blog
文章介绍了一种防范ASCII Smuggling攻击的方法。通过持续监控LLM接收到的原始输入数据,检测其中的零宽字符等恶意模式,并在发现可疑活动时立即发出警报。安全团队可以迅速采取措施隔离来源或审查输出结果,从而有效防止恶意数据扩散。 2025-10-6 17:34:21 Author: securityboulevard.com(查看原文) 阅读量:3 收藏

Oct 06, 2025 – Alan Fagan – Operationalizing Defense
The key to catching ASCII Smuggling is monitoring the raw input payload, the exact string the LLM tokenization engine receives, not just the visible text.
Ingestion: FireTail continuously records LLM activity logs from all your integrated platforms.
Analysis: Our platform analyzes the raw payload data for the specific sequences of Tags Unicode Blocks and other zero-width characters used in smuggling attacks.
Alerting: We generate an alert (e.g., “ASCII Smuggling Attempt”) the moment the pattern is detected in the input stream.
Response: Security teams can immediately isolate the source (e.g., block the malicious calendar sender) or, more importantly, flag the resulting LLM output for manual review. This prevents the poisoned data from reaching critical systems or other users.

This is a necessary shift in strategy. You can’t rely on the LLM to police itself, and you can’t rely on the UI to show you the full story. Monitoring the raw input stream is the only reliable control point against these application-layer flaws. This is how we are hardening the AI perimeter for our customers.

If you would like to see how FireTail can protect your organization from this and other AI security risks, start a 14-day trial today. Book your onboarding call here to get started.

Techstrong Gang Youtube

*** This is a Security Bloggers Network syndicated blog from FireTail - AI and API Security Blog authored by FireTail - AI and API Security Blog. Read the original post at: https://www.firetail.ai/blog/ghosts-in-the-machine-ascii-smuggling-across-various-llms


文章来源: https://securityboulevard.com/2025/10/ghosts-in-the-machine-ascii-smuggling-across-various-llms-firetail-blog/
如有侵权请联系:admin#unsafe.sh