Basic safeguard against instruction set leaks

What if you passed everything through a function; a function built to detect instruction fishing? That function could use a myriad of approaches, even another an LLM trained on detecting such behavior…

2 Likes