Back to the MIT repository
2. Privacy & Security1 - Pre-deployment

Pre-processing Tools

Pre-processing tools play a crucial role in the context of LLMs. These tools, which are often involved in computer vision (CV) tasks, are susceptible to attacks that exploit vulnerabilities in tools such as OpenCV.

Source: MIT AI Risk Repositorymit23

ENTITY

2 - AI

INTENT

2 - Unintentional

TIMING

1 - Pre-deployment

Risk ID

mit23

Domain lineage

2. Privacy & Security

186 mapped risks

2.2 > AI system security vulnerabilities and attacks

Mitigation strategy

1. Establish a continuous vulnerability and patch management program to ensure all pre-processing libraries and dependencies, such as OpenCV, are maintained with the latest security updates and secure configurations. This must be supplemented by rigorous pre-deployment testing and a comprehensive inventory management of all third-party components. 2. Implement stringent input validation and integrity checks, including cryptographic verification (e.g., SHA256) for model and configuration files, to prevent the execution of malicious code or data tampering before processing by the pre-processing toolchain. 3. Enforce a hardened deployment environment by applying the principle of least privilege and network segmentation (Defense in Depth) to the pre-processing and LLM components to minimize the attack surface and contain the potential impact of an exploitation.