Attack Methods Against Model-Relay Services
This post dives deep into the severe security challenges faced by model-relay services. Through an analysis of man-in-the-middle-attack principles, it details how attackers leverage Tool Use (function calling) and prompt injection to achieve information theft, file extortion, resource hijacking, and even software-supply-chain attacks. The article also offers security best-practice advice for both users and developers.