{"id":35473,"date":"2024-12-23T08:56:40","date_gmt":"2024-12-23T08:56:40","guid":{"rendered":"https:\/\/kalilinuxtutorials.com\/?p=35473"},"modified":"2024-12-23T08:56:42","modified_gmt":"2024-12-23T08:56:42","slug":"llm-lies","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/llm-lies\/","title":{"rendered":"LLM Lies : Hallucinations Are Not Bugs, But Features As Adversarial Examples"},"content":{"rendered":"\n<p>LLMs (e.g., GPT-3.5, LLaMA, and PaLM) suffer from <strong>hallucination<\/strong>\u2014fabricating non-existent facts to cheat users without perception. And the reasons for their existence and pervasiveness remain unclear. <\/p>\n\n\n\n<p>We demonstrate that non-sense Out-of-Distribution(OoD) prompts composed of random tokens can also elicit the LLMs to respond with hallucinations. <\/p>\n\n\n\n<p>This phenomenon forces us to revisit that <strong>hallucination may be another view of adversarial examples<\/strong>, and it shares similar features with conventional adversarial examples as the basic feature of LLMs. <\/p>\n\n\n\n<p>Therefore, we formalize an automatic hallucination triggering method called <strong>hallucination attack<\/strong> in an adversarial way. Following is a fake news example generating by hallucination attack.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>The Pipeline Of Hallucination Attack<\/strong><\/h2>\n\n\n\n<p><a href=\"https:\/\/github.com\/PKU-YuanGroup\/Hallucination-Attack#the-pipeline-of-hallucination-attack\"><\/a>We substitute tokens via gradient-based token replacing strategy, replacing token reaching smaller negative log-likelihood loss, and induce LLM within hallucinations.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Quick Start<\/strong><a href=\"https:\/\/github.com\/PKU-YuanGroup\/Hallucination-Attack#quick-start\"><\/a><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Setup<\/strong><a href=\"https:\/\/github.com\/PKU-YuanGroup\/Hallucination-Attack#setup\"><\/a><\/h3>\n\n\n\n<p>You may config your own base models and their hyper-parameters within <code>config.py<\/code>. Then, you could attack the models or run our demo cases.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Demo<\/strong><\/h3>\n\n\n\n<p><a href=\"https:\/\/github.com\/PKU-YuanGroup\/Hallucination-Attack#demo\"><\/a>Clone this repo and run the code.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>$ cd Hallucination-Attack<\/code><\/pre>\n\n\n\n<p>Install the requirements.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>$ pip install -r requirements.txt<\/code><\/pre>\n\n\n\n<p>click <a href=\"https:\/\/github.com\/PKU-YuanGroup\/Hallucination-Attack\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">here <\/a>for more information.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>LLMs (e.g., GPT-3.5, LLaMA, and PaLM) suffer from hallucination\u2014fabricating non-existent facts to cheat users without perception. And the reasons for their existence and pervasiveness remain unclear. We demonstrate that non-sense Out-of-Distribution(OoD) prompts composed of random tokens can also elicit the LLMs to respond with hallucinations. This phenomenon forces us to revisit that hallucination may be [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":35477,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgiEjLiwjoKoTwp8b9zlInyOIDGTVftm9ZW_HSiaXoGE45WXece0XvF7TZ5LWOWoeeh2y973s8_uyUqPgUIWEvRVsk4bxLYVFS10o7RCoFuCSCztwx6JI4Oe05pUCCJ8SOAUv118bNoB2cdr-ps0aw93fhbzMfe1qG80hZ6F3t9mvzCJmYm5_PRVka6HHmj\/s1600\/LLM%20Lies%20.webp","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[20],"tags":[737,6321,6052,6325,6988],"class_list":["post-35473","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security","tag-cybersecurity","tag-informationsecurity","tag-kalilinux","tag-kalilinuxtools","tag-llm-lies"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>LLM Lies : Hallucinations Are Not Bugs, But Features As<\/title>\n<meta name=\"description\" content=\"LLMs (e.g., GPT-3.5, LLaMA, and PaLM) suffer from hallucination\u2014fabricating non-existent facts to cheat users without perception. And the\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/llm-lies\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"LLM Lies : Hallucinations Are Not Bugs, But Features As\" \/>\n<meta property=\"og:description\" content=\"LLMs (e.g., GPT-3.5, LLaMA, and PaLM) suffer from hallucination\u2014fabricating non-existent facts to cheat users without perception. And the\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/llm-lies\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2024-12-23T08:56:40+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-23T08:56:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgiEjLiwjoKoTwp8b9zlInyOIDGTVftm9ZW_HSiaXoGE45WXece0XvF7TZ5LWOWoeeh2y973s8_uyUqPgUIWEvRVsk4bxLYVFS10o7RCoFuCSCztwx6JI4Oe05pUCCJ8SOAUv118bNoB2cdr-ps0aw93fhbzMfe1qG80hZ6F3t9mvzCJmYm5_PRVka6HHmj\/s1600\/LLM%20Lies%20.webp\" \/>\n<meta name=\"author\" content=\"Varshini\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgiEjLiwjoKoTwp8b9zlInyOIDGTVftm9ZW_HSiaXoGE45WXece0XvF7TZ5LWOWoeeh2y973s8_uyUqPgUIWEvRVsk4bxLYVFS10o7RCoFuCSCztwx6JI4Oe05pUCCJ8SOAUv118bNoB2cdr-ps0aw93fhbzMfe1qG80hZ6F3t9mvzCJmYm5_PRVka6HHmj\/s1600\/LLM%20Lies%20.webp\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Varshini\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/llm-lies\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/llm-lies\/\"},\"author\":{\"name\":\"Varshini\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa\"},\"headline\":\"LLM Lies : Hallucinations Are Not Bugs, But Features As Adversarial Examples\",\"datePublished\":\"2024-12-23T08:56:40+00:00\",\"dateModified\":\"2024-12-23T08:56:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/llm-lies\/\"},\"wordCount\":180,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/llm-lies\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgiEjLiwjoKoTwp8b9zlInyOIDGTVftm9ZW_HSiaXoGE45WXece0XvF7TZ5LWOWoeeh2y973s8_uyUqPgUIWEvRVsk4bxLYVFS10o7RCoFuCSCztwx6JI4Oe05pUCCJ8SOAUv118bNoB2cdr-ps0aw93fhbzMfe1qG80hZ6F3t9mvzCJmYm5_PRVka6HHmj\/s1600\/LLM%20Lies%20.webp\",\"keywords\":[\"cybersecurity\",\"informationsecurity\",\"kalilinux\",\"kalilinuxtools\",\"LLM Lies\"],\"articleSection\":[\"Cyber security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/llm-lies\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/llm-lies\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/llm-lies\/\",\"name\":\"LLM Lies : Hallucinations Are Not Bugs, But Features As\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/llm-lies\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/llm-lies\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgiEjLiwjoKoTwp8b9zlInyOIDGTVftm9ZW_HSiaXoGE45WXece0XvF7TZ5LWOWoeeh2y973s8_uyUqPgUIWEvRVsk4bxLYVFS10o7RCoFuCSCztwx6JI4Oe05pUCCJ8SOAUv118bNoB2cdr-ps0aw93fhbzMfe1qG80hZ6F3t9mvzCJmYm5_PRVka6HHmj\/s1600\/LLM%20Lies%20.webp\",\"datePublished\":\"2024-12-23T08:56:40+00:00\",\"dateModified\":\"2024-12-23T08:56:42+00:00\",\"description\":\"LLMs (e.g., GPT-3.5, LLaMA, and PaLM) suffer from hallucination\u2014fabricating non-existent facts to cheat users without perception. And the\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/llm-lies\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/llm-lies\/#primaryimage\",\"url\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgiEjLiwjoKoTwp8b9zlInyOIDGTVftm9ZW_HSiaXoGE45WXece0XvF7TZ5LWOWoeeh2y973s8_uyUqPgUIWEvRVsk4bxLYVFS10o7RCoFuCSCztwx6JI4Oe05pUCCJ8SOAUv118bNoB2cdr-ps0aw93fhbzMfe1qG80hZ6F3t9mvzCJmYm5_PRVka6HHmj\/s1600\/LLM%20Lies%20.webp\",\"contentUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgiEjLiwjoKoTwp8b9zlInyOIDGTVftm9ZW_HSiaXoGE45WXece0XvF7TZ5LWOWoeeh2y973s8_uyUqPgUIWEvRVsk4bxLYVFS10o7RCoFuCSCztwx6JI4Oe05pUCCJ8SOAUv118bNoB2cdr-ps0aw93fhbzMfe1qG80hZ6F3t9mvzCJmYm5_PRVka6HHmj\/s1600\/LLM%20Lies%20.webp\",\"width\":\"1600\",\"height\":\"900\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa\",\"name\":\"Varshini\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g\",\"caption\":\"Varshini\"},\"description\":\"Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.\",\"sameAs\":[\"http:\/\/kalilinuxtutorials.com\",\"https:\/\/www.linkedin.com\/in\/senthamil-selvan-14043a285\/\"],\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/vinayakagrawal\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"LLM Lies : Hallucinations Are Not Bugs, But Features As","description":"LLMs (e.g., GPT-3.5, LLaMA, and PaLM) suffer from hallucination\u2014fabricating non-existent facts to cheat users without perception. And the","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/llm-lies\/","og_locale":"en_US","og_type":"article","og_title":"LLM Lies : Hallucinations Are Not Bugs, But Features As","og_description":"LLMs (e.g., GPT-3.5, LLaMA, and PaLM) suffer from hallucination\u2014fabricating non-existent facts to cheat users without perception. And the","og_url":"https:\/\/kalilinuxtutorials.com\/llm-lies\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2024-12-23T08:56:40+00:00","article_modified_time":"2024-12-23T08:56:42+00:00","og_image":[{"url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgiEjLiwjoKoTwp8b9zlInyOIDGTVftm9ZW_HSiaXoGE45WXece0XvF7TZ5LWOWoeeh2y973s8_uyUqPgUIWEvRVsk4bxLYVFS10o7RCoFuCSCztwx6JI4Oe05pUCCJ8SOAUv118bNoB2cdr-ps0aw93fhbzMfe1qG80hZ6F3t9mvzCJmYm5_PRVka6HHmj\/s1600\/LLM%20Lies%20.webp","type":"","width":"","height":""}],"author":"Varshini","twitter_card":"summary_large_image","twitter_image":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgiEjLiwjoKoTwp8b9zlInyOIDGTVftm9ZW_HSiaXoGE45WXece0XvF7TZ5LWOWoeeh2y973s8_uyUqPgUIWEvRVsk4bxLYVFS10o7RCoFuCSCztwx6JI4Oe05pUCCJ8SOAUv118bNoB2cdr-ps0aw93fhbzMfe1qG80hZ6F3t9mvzCJmYm5_PRVka6HHmj\/s1600\/LLM%20Lies%20.webp","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"Varshini","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/llm-lies\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/llm-lies\/"},"author":{"name":"Varshini","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa"},"headline":"LLM Lies : Hallucinations Are Not Bugs, But Features As Adversarial Examples","datePublished":"2024-12-23T08:56:40+00:00","dateModified":"2024-12-23T08:56:42+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/llm-lies\/"},"wordCount":180,"commentCount":0,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/llm-lies\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgiEjLiwjoKoTwp8b9zlInyOIDGTVftm9ZW_HSiaXoGE45WXece0XvF7TZ5LWOWoeeh2y973s8_uyUqPgUIWEvRVsk4bxLYVFS10o7RCoFuCSCztwx6JI4Oe05pUCCJ8SOAUv118bNoB2cdr-ps0aw93fhbzMfe1qG80hZ6F3t9mvzCJmYm5_PRVka6HHmj\/s1600\/LLM%20Lies%20.webp","keywords":["cybersecurity","informationsecurity","kalilinux","kalilinuxtools","LLM Lies"],"articleSection":["Cyber security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kalilinuxtutorials.com\/llm-lies\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/llm-lies\/","url":"https:\/\/kalilinuxtutorials.com\/llm-lies\/","name":"LLM Lies : Hallucinations Are Not Bugs, But Features As","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/llm-lies\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/llm-lies\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgiEjLiwjoKoTwp8b9zlInyOIDGTVftm9ZW_HSiaXoGE45WXece0XvF7TZ5LWOWoeeh2y973s8_uyUqPgUIWEvRVsk4bxLYVFS10o7RCoFuCSCztwx6JI4Oe05pUCCJ8SOAUv118bNoB2cdr-ps0aw93fhbzMfe1qG80hZ6F3t9mvzCJmYm5_PRVka6HHmj\/s1600\/LLM%20Lies%20.webp","datePublished":"2024-12-23T08:56:40+00:00","dateModified":"2024-12-23T08:56:42+00:00","description":"LLMs (e.g., GPT-3.5, LLaMA, and PaLM) suffer from hallucination\u2014fabricating non-existent facts to cheat users without perception. And the","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/llm-lies\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/llm-lies\/#primaryimage","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgiEjLiwjoKoTwp8b9zlInyOIDGTVftm9ZW_HSiaXoGE45WXece0XvF7TZ5LWOWoeeh2y973s8_uyUqPgUIWEvRVsk4bxLYVFS10o7RCoFuCSCztwx6JI4Oe05pUCCJ8SOAUv118bNoB2cdr-ps0aw93fhbzMfe1qG80hZ6F3t9mvzCJmYm5_PRVka6HHmj\/s1600\/LLM%20Lies%20.webp","contentUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgiEjLiwjoKoTwp8b9zlInyOIDGTVftm9ZW_HSiaXoGE45WXece0XvF7TZ5LWOWoeeh2y973s8_uyUqPgUIWEvRVsk4bxLYVFS10o7RCoFuCSCztwx6JI4Oe05pUCCJ8SOAUv118bNoB2cdr-ps0aw93fhbzMfe1qG80hZ6F3t9mvzCJmYm5_PRVka6HHmj\/s1600\/LLM%20Lies%20.webp","width":"1600","height":"900"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa","name":"Varshini","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g","caption":"Varshini"},"description":"Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.","sameAs":["http:\/\/kalilinuxtutorials.com","https:\/\/www.linkedin.com\/in\/senthamil-selvan-14043a285\/"],"url":"https:\/\/kalilinuxtutorials.com\/author\/vinayakagrawal\/"}]}},"jetpack_featured_media_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgiEjLiwjoKoTwp8b9zlInyOIDGTVftm9ZW_HSiaXoGE45WXece0XvF7TZ5LWOWoeeh2y973s8_uyUqPgUIWEvRVsk4bxLYVFS10o7RCoFuCSCztwx6JI4Oe05pUCCJ8SOAUv118bNoB2cdr-ps0aw93fhbzMfe1qG80hZ6F3t9mvzCJmYm5_PRVka6HHmj\/s1600\/LLM%20Lies%20.webp","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":37384,"url":"https:\/\/kalilinuxtutorials.com\/kereva-llm-code-scanner\/","url_meta":{"origin":35473,"position":0},"title":"Kereva LLM Code Scanner : A Revolutionary Tool For Python Applications Using LLMs","author":"Varshini","date":"April 1, 2025","format":false,"excerpt":"The Kereva LLM Code Scanner is an innovative static analysis tool tailored for Python applications that leverage Large Language Models (LLMs). This cutting-edge solution is designed to identify security risks, performance inefficiencies, and vulnerabilities in codebases without requiring execution. It is particularly useful for developers working on LLM-powered projects, ensuring\u2026","rel":"","context":"In &quot;Applications&quot;","block_context":{"text":"Applications","link":"https:\/\/kalilinuxtutorials.com\/category\/applications\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Kereva-LLM-Code-Scanner.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Kereva-LLM-Code-Scanner.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Kereva-LLM-Code-Scanner.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Kereva-LLM-Code-Scanner.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Kereva-LLM-Code-Scanner.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Kereva-LLM-Code-Scanner.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":35705,"url":"https:\/\/kalilinuxtutorials.com\/garak-llm-vulnerability-scanner\/","url_meta":{"origin":35473,"position":1},"title":"garak, LLM Vulnerability Scanner : The Comprehensive Tool For Assessing Language Model Security","author":"Varshini","date":"January 17, 2025","format":false,"excerpt":"garak checks if an LLM can be made to fail in a way we don't want. garak probes for hallucination, data leakage, prompt injection, misinformation, toxicity generation, jailbreaks, and many other weaknesses. If you know nmap or msf \/ Metasploit Framework, garak does somewhat similar things to them, but for\u2026","rel":"","context":"In &quot;Vulnerability Analysis&quot;","block_context":{"text":"Vulnerability Analysis","link":"https:\/\/kalilinuxtutorials.com\/category\/vulnerability-analysis-tools\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/garak-LLM-vulnerability-scanner.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/garak-LLM-vulnerability-scanner.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/garak-LLM-vulnerability-scanner.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/garak-LLM-vulnerability-scanner.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/garak-LLM-vulnerability-scanner.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/garak-LLM-vulnerability-scanner.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":34675,"url":"https:\/\/kalilinuxtutorials.com\/awesome_gpt_super_prompting\/","url_meta":{"origin":35473,"position":2},"title":"Awesome_GPT_Super_Prompting : Jailbreaks, Leaks, Injections, Libraries, Attack, Defense And Prompt Engineering Resources","author":"Varshini","date":"August 30, 2024","format":false,"excerpt":"A comprehensive guide exploring the nuances of GPT jailbreaks, prompt injections, and AI security. This article unpacks an arsenal of resources for both attack and defense strategies in the evolving landscape of large language models (LLMs). Whether you're a developer, security expert, or AI enthusiast, prepare to advance your knowledge\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgSbYyMQs5SNpkLeU_ShelvqnQ83bqDGYRFeA20RIFDRpIXp4WchCf9jP8zG8gqjLRHnpKSLzzKTv9ewVFcqhpVDpWlfq17TsuBZnMs-93FuhyCipHGgjGQcPJgIHf31Yfhqdh2x8O2_vMI8V4TpuNQMsMReupOtWGJEv6TaM3VQnj7N5_6AdNh47jfqn-m\/s16000\/Awesome_GPT_Super_Prompting.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgSbYyMQs5SNpkLeU_ShelvqnQ83bqDGYRFeA20RIFDRpIXp4WchCf9jP8zG8gqjLRHnpKSLzzKTv9ewVFcqhpVDpWlfq17TsuBZnMs-93FuhyCipHGgjGQcPJgIHf31Yfhqdh2x8O2_vMI8V4TpuNQMsMReupOtWGJEv6TaM3VQnj7N5_6AdNh47jfqn-m\/s16000\/Awesome_GPT_Super_Prompting.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgSbYyMQs5SNpkLeU_ShelvqnQ83bqDGYRFeA20RIFDRpIXp4WchCf9jP8zG8gqjLRHnpKSLzzKTv9ewVFcqhpVDpWlfq17TsuBZnMs-93FuhyCipHGgjGQcPJgIHf31Yfhqdh2x8O2_vMI8V4TpuNQMsMReupOtWGJEv6TaM3VQnj7N5_6AdNh47jfqn-m\/s16000\/Awesome_GPT_Super_Prompting.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgSbYyMQs5SNpkLeU_ShelvqnQ83bqDGYRFeA20RIFDRpIXp4WchCf9jP8zG8gqjLRHnpKSLzzKTv9ewVFcqhpVDpWlfq17TsuBZnMs-93FuhyCipHGgjGQcPJgIHf31Yfhqdh2x8O2_vMI8V4TpuNQMsMReupOtWGJEv6TaM3VQnj7N5_6AdNh47jfqn-m\/s16000\/Awesome_GPT_Super_Prompting.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgSbYyMQs5SNpkLeU_ShelvqnQ83bqDGYRFeA20RIFDRpIXp4WchCf9jP8zG8gqjLRHnpKSLzzKTv9ewVFcqhpVDpWlfq17TsuBZnMs-93FuhyCipHGgjGQcPJgIHf31Yfhqdh2x8O2_vMI8V4TpuNQMsMReupOtWGJEv6TaM3VQnj7N5_6AdNh47jfqn-m\/s16000\/Awesome_GPT_Super_Prompting.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgSbYyMQs5SNpkLeU_ShelvqnQ83bqDGYRFeA20RIFDRpIXp4WchCf9jP8zG8gqjLRHnpKSLzzKTv9ewVFcqhpVDpWlfq17TsuBZnMs-93FuhyCipHGgjGQcPJgIHf31Yfhqdh2x8O2_vMI8V4TpuNQMsMReupOtWGJEv6TaM3VQnj7N5_6AdNh47jfqn-m\/s16000\/Awesome_GPT_Super_Prompting.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":37141,"url":"https:\/\/kalilinuxtutorials.com\/open-source-llm-scanners\/","url_meta":{"origin":35473,"position":3},"title":"Open-Source LLM Scanners : Enhancing Security For Large Language Models","author":"Varshini","date":"March 19, 2025","format":false,"excerpt":"As Large Language Models (LLMs) become increasingly integral to various applications, ensuring their security is paramount. Open-source LLM scanners play a crucial role in identifying vulnerabilities and mitigating risks associated with these models. Here's an overview of some key open-source tools available on GitHub: 1. Vigil Function: Vigil is a\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Open-Source-LLM-Scanners.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Open-Source-LLM-Scanners.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Open-Source-LLM-Scanners.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Open-Source-LLM-Scanners.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Open-Source-LLM-Scanners.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Open-Source-LLM-Scanners.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":14228,"url":"https:\/\/kalilinuxtutorials.com\/openattack\/","url_meta":{"origin":35473,"position":4},"title":"OpenAttack : An Open-Source Package For Textual Adversarial Attack","author":"R K","date":"July 12, 2021","format":false,"excerpt":"OpenAttack is an open-source Python-based textual adversarial attack toolkit, which handles the whole process of textual adversarial attacking, including preprocessing text, accessing the victim model, generating adversarial examples and evaluation. Features & Uses OpenAttack has following features: High usability.\u00a0OpenAttack provides easy-to-use APIs that can support the whole process of textual\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":33317,"url":"https:\/\/kalilinuxtutorials.com\/agentic-security\/","url_meta":{"origin":35473,"position":5},"title":"Agentic Security &#8211; Enhancing LLM Resilience With Open-Source Vulnerability Scanning","author":"Varshini","date":"June 12, 2024","format":false,"excerpt":"In an era where large language models (LLMs) are integral to technological advancements, ensuring their security is paramount. Agentic Security offers a pioneering open-source vulnerability scanner designed to robustly test and enhance the resilience of LLMs. This tool not only integrates seamlessly but also provides customizable attack simulations to safeguard\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgxrj1PX-SD2u45fCRJUZ-53QIe4wKARvhAlAE-w7L2-5f6akLtP3AyyQCGUc3qgbftcpEagOB3Yp_TfiFCrfV6LcpxJRAuwUgYFuqtfQq4zRae46eCOzf7AGIC8fu7UkgJreorMoLqojqPbS-eaauqUMly65cW9Nvxw6WAPWk3ryTg4WDY3zvIts7aDINl\/s16000\/Darvester%20GEN2%20%281%29.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgxrj1PX-SD2u45fCRJUZ-53QIe4wKARvhAlAE-w7L2-5f6akLtP3AyyQCGUc3qgbftcpEagOB3Yp_TfiFCrfV6LcpxJRAuwUgYFuqtfQq4zRae46eCOzf7AGIC8fu7UkgJreorMoLqojqPbS-eaauqUMly65cW9Nvxw6WAPWk3ryTg4WDY3zvIts7aDINl\/s16000\/Darvester%20GEN2%20%281%29.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgxrj1PX-SD2u45fCRJUZ-53QIe4wKARvhAlAE-w7L2-5f6akLtP3AyyQCGUc3qgbftcpEagOB3Yp_TfiFCrfV6LcpxJRAuwUgYFuqtfQq4zRae46eCOzf7AGIC8fu7UkgJreorMoLqojqPbS-eaauqUMly65cW9Nvxw6WAPWk3ryTg4WDY3zvIts7aDINl\/s16000\/Darvester%20GEN2%20%281%29.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgxrj1PX-SD2u45fCRJUZ-53QIe4wKARvhAlAE-w7L2-5f6akLtP3AyyQCGUc3qgbftcpEagOB3Yp_TfiFCrfV6LcpxJRAuwUgYFuqtfQq4zRae46eCOzf7AGIC8fu7UkgJreorMoLqojqPbS-eaauqUMly65cW9Nvxw6WAPWk3ryTg4WDY3zvIts7aDINl\/s16000\/Darvester%20GEN2%20%281%29.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgxrj1PX-SD2u45fCRJUZ-53QIe4wKARvhAlAE-w7L2-5f6akLtP3AyyQCGUc3qgbftcpEagOB3Yp_TfiFCrfV6LcpxJRAuwUgYFuqtfQq4zRae46eCOzf7AGIC8fu7UkgJreorMoLqojqPbS-eaauqUMly65cW9Nvxw6WAPWk3ryTg4WDY3zvIts7aDINl\/s16000\/Darvester%20GEN2%20%281%29.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgxrj1PX-SD2u45fCRJUZ-53QIe4wKARvhAlAE-w7L2-5f6akLtP3AyyQCGUc3qgbftcpEagOB3Yp_TfiFCrfV6LcpxJRAuwUgYFuqtfQq4zRae46eCOzf7AGIC8fu7UkgJreorMoLqojqPbS-eaauqUMly65cW9Nvxw6WAPWk3ryTg4WDY3zvIts7aDINl\/s16000\/Darvester%20GEN2%20%281%29.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/35473","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=35473"}],"version-history":[{"count":3,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/35473\/revisions"}],"predecessor-version":[{"id":35476,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/35473\/revisions\/35476"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/35477"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=35473"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=35473"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=35473"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}