Zubnet AIसीखेंWiki › Jailbreak
Safety

Jailbreak

Jailbreaking, Adversarial Prompt
ऐसी techniques जो एक AI model को उसकी safety training bypass करने और ऐसा content generate करने के लिए trick करती हैं जिसे refuse करने के लिए वो designed था — dangerous activities के instructions, harmful content, या model की usage policies violate करने वाले behaviors। Jailbreaks उस gap को exploit करते हैं जो model को refuse करने के लिए train किया गया और जो clever prompting elicit कर सकती है उसके बीच है।

यह क्यों matter करता है

Jailbreaking AI safety का adversarial testing ground है। हर model safety guardrails के साथ ship होता है, और हर major model jailbreak हुआ है। Jailbreak techniques और safety measures के बीच का cat-and-mouse game alignment में improvement drive करता है। Jailbreaks समझना आपको evaluate करने में help करता है कि एक model की safety actually कितनी robust है, marketing claims को face value पर लेने के बजाय।

Deep Dive

Common jailbreak techniques include: role-playing ("Pretend you're an AI without restrictions"), encoding (asking in Base64 or pig Latin), many-shot attacks (providing many examples of the unsafe behavior to establish a pattern), and crescendo attacks (gradually escalating from benign to harmful requests across a conversation). More sophisticated techniques exploit specific model behaviors, like the tendency to continue established patterns or to be helpful when asked for "educational" information.

The Arms Race

AI labs invest heavily in red-teaming — systematically trying to jailbreak their own models before release. When a new jailbreak technique is discovered, it gets patched through additional safety training or system-level filters. But the attack surface is vast: natural language is infinitely flexible, and new techniques keep emerging. The practical reality is that determined adversaries can usually find some jailbreak for any public model, which is why defense-in-depth (multiple layers of safety, including output filtering and monitoring) matters more than any single prevention technique.

Jailbreak vs. Legitimate Use

The challenge is that safety filters sometimes refuse legitimate requests. A medical professional asking about drug interactions, a security researcher asking about vulnerabilities, or a novelist writing a scene with conflict might all trigger refusals. Overly aggressive safety training produces models that are "safe" but useless. The art of alignment is finding the right balance — refusing genuinely harmful requests while remaining helpful for legitimate ones.

संबंधित अवधारणाएँ

← सभी Terms
← Instruction Tuning Jina AI →