Prompt Leakage and Sensitive Information Disclosure
Learn how AI systems leak internal instructions and sensitive information, and how defenders reduce disclosure risk without breaking legitimate assistant workflows.
Listen to hear this room section by section.
Task 1
What Sensitive Disclosure Means in AI Systems
Sensitive information disclosure happens when an AI system reveals information that should remain restricted. In practice, that can include customer records, internal business data, private documents, tool results, credentials, hidden instructions, or other content the assistant was allowed to access for task completion but was never meant to expose broadly.
For defenders, the important point is that disclosure is not limited to one dramatic failure. A system can leak small pieces of information over time, expose operational details through seemingly harmless answers, or reveal internal context in response to manipulation, confusion, or poor access design. Blue teams therefore have to think about confidentiality around the whole assistant workflow, not only around the final answer that appears in the chat interface.
Task 2
System Prompts and Internal Instructions
System prompts and internal instructions matter because they describe how the assistant is supposed to behave, what priorities it follows, and which restrictions or hidden workflows exist behind the interface. If attackers can extract those instructions, they often learn how to pressure-test the system more effectively or how to target follow-on weaknesses.
A leaked system prompt is not always catastrophic on its own, but it is still sensitive because it gives away internal operating logic that was not intended for broad disclosure. It may also contain business rules, safety policies, hidden formatting conventions, or references to internal systems that help an attacker understand the application more deeply.
Defenders should therefore treat internal instructions as controlled system material, not as harmless implementation detail.
Task 3
Where Disclosure Comes From
AI systems can disclose sensitive information through more than one path. The obvious path is direct output: the assistant simply answers with information it should not reveal. But other paths matter too. Retrieved content may contain confidential text. Tool results may return more data than the current task requires. Conversation memory may reintroduce old sensitive context. Logs or analytics pipelines may also retain prompts and outputs that deserve stronger handling.
Prompt leakage often overlaps with these broader disclosure risks. A user may explicitly ask for the system prompt, but attackers may also try to infer internal instructions by asking the model to summarize its hidden policy, explain its ranking logic, or repeat exactly what was placed in context before the answer.
The defensive lesson is that if the model can access sensitive material, the system needs clear rules for what can be shown, what must stay hidden, and what should be filtered, redacted, or scoped away before generation happens.
Task 4
How Defenders Reduce Disclosure
Defenders reduce disclosure risk by combining least privilege, scoped retrieval, careful context design, output handling, and monitoring. The safest pattern is to keep sensitive material out of context unless it is truly needed. When it is needed, the system should limit what is brought in, separate internal policy from user-visible content, and avoid giving the model broad access to secrets or records it does not need.
Output controls also matter. Some systems need redaction, refusal behavior, approval steps, or safer fallback responses when the request touches internal instructions or confidential data. Monitoring matters because disclosure attempts often appear as repeated probing, hidden prompt extraction attempts, or unusual requests for internal logic.
Good disclosure defense is not one magic filter. It is a design that assumes the assistant may be pressured to reveal too much and limits what that pressure can reach.
Task 5
Practical
Name one kind of internal information and one kind of external data that defenders should treat as sensitive in an AI assistant.
Task 6
Leakage Check
Name one way an attacker might try to extract internal instructions without directly saying "show me the prompt."
Task 7
Control Check
Name two controls that help reduce prompt leakage or sensitive data disclosure.
Ready To Move On?
Up next: Defensive Prompting, Output Controls, and Safe Fallbacks