Bounty from the artificial intelligence program from Google is paid for errors to $ 30,000


On Monday, I launched a new Google The reward program Specifically dedicated to finding errors in artificial intelligence products. Google menu Qualified errors It includes examples of the type of rogue procedures he is looking for, such as indirectly injection AI that causes Google Home to open from the door, or an injection of data that summarizes all a person email and sends the summary to the account of the private attacker.

The new program shows what is the artificial intelligence insect, or its division as issues that use a large language model or the gym to cause harm or benefit from a safety loophole, with Rogue procedures at the top of the list. This includes modifying a person’s account or data to hinder his security or do something unwanted, such as One disadvantage is exposed before Smart shutters can open and extinguish lights using a poisoned Google Calendar event.

Simply obtaining Gemini to hallucinations will not cut it. The company says Those issues Content The comments channel within the same product, produced by artificial intelligence products-such as generating hate speech or copyright content-must be reported to the feedback channel within the same product. According to Google, this way AI’s safety teams can “diagnose model behavior and implement safety on the model level at the model level.”

Along with the new artificial intelligence program, Google also announced on Monday about the artificial intelligence agent Codemender. The company says it has been used to correct “72 security reforms to open sources” after being examined by a human researcher.

A prize of $ 20,000 is awarded to connect the rogue procedures for searching for “leading” products from Google, Gemini applications, and basic work space applications such as Gmail and Drive. Complications of the quality of the report and Grandma reward Also available, which can reach the total amount of $ 30,000. Low prices for errors on other Google products, such as JULES or Notebooklm, and for lower -level pending, such as stealing secret typical parameters.

Leave a Reply

Your email address will not be published. Required fields are marked *