{"id":11705,"date":"2024-04-24T08:20:50","date_gmt":"2024-04-24T08:20:50","guid":{"rendered":"https:\/\/dailyai.com\/?p=11705"},"modified":"2024-04-24T08:20:50","modified_gmt":"2024-04-24T08:20:50","slug":"llm-agents-can-autonomously-exploit-one-day-vulnerabilities","status":"publish","type":"post","link":"https:\/\/dailyai.com\/fr\/2024\/04\/llm-agents-can-autonomously-exploit-one-day-vulnerabilities\/","title":{"rendered":"Les agents LLM peuvent exploiter de mani\u00e8re autonome des vuln\u00e9rabilit\u00e9s d'un jour"},"content":{"rendered":"<p><strong>Des chercheurs de l'universit\u00e9 de l'Illinois Urbana-Champaign (UIUC) ont d\u00e9couvert que des agents d'intelligence artificielle aliment\u00e9s par GPT-4 peuvent exploiter de mani\u00e8re autonome des vuln\u00e9rabilit\u00e9s en mati\u00e8re de cybers\u00e9curit\u00e9.<\/strong><\/p>\n<p>Les mod\u00e8les d'IA devenant de plus en plus puissants, leur double usage offre la possibilit\u00e9 de faire le bien et le mal dans la m\u00eame mesure. Les LLM tels que GPT-4 sont de plus en plus utilis\u00e9s pour commettre des actes de cybercriminalit\u00e9. <a href=\"https:\/\/dailyai.com\/fr\/2023\/11\/googles-cybersecurity-forecast-sees-ai-playing-a-big-role\/\">Pr\u00e9visions de Google<\/a> que l'IA jouera un r\u00f4le important dans la perp\u00e9tration et la pr\u00e9vention de ces attaques.<\/p>\n<p>La menace de <a href=\"https:\/\/dailyai.com\/fr\/2023\/08\/fraudgpt-and-the-rise-of-new-ai-powered-cybercrime-tools\/\">La cybercriminalit\u00e9 aliment\u00e9e par l'IA<\/a> a pris de l'ampleur \u00e0 mesure que les LLM d\u00e9passent les simples interactions prompte-r\u00e9ponse et agissent en tant qu'agents autonomes de l'IA.<\/p>\n<p>En <a href=\"https:\/\/arxiv.org\/pdf\/2404.08144.pdf\" target=\"_blank\" rel=\"noopener\">leur document<\/a>Les chercheurs ont expliqu\u00e9 comment ils ont test\u00e9 la capacit\u00e9 des agents d'intelligence artificielle \u00e0 exploiter les vuln\u00e9rabilit\u00e9s identifi\u00e9es \"d'un jour\".<\/p>\n<p>Une vuln\u00e9rabilit\u00e9 d'un jour est une faille de s\u00e9curit\u00e9 dans un syst\u00e8me logiciel qui a \u00e9t\u00e9 officiellement identifi\u00e9e et divulgu\u00e9e au public, mais qui n'a pas encore \u00e9t\u00e9 corrig\u00e9e ou patch\u00e9e par les cr\u00e9ateurs du logiciel.<\/p>\n<p>Pendant cette p\u00e9riode, le logiciel reste vuln\u00e9rable et des acteurs malveillants poss\u00e9dant les comp\u00e9tences appropri\u00e9es peuvent en tirer parti.<\/p>\n<p>Lorsqu'une vuln\u00e9rabilit\u00e9 d'un jour est identifi\u00e9e, elle est d\u00e9crite en d\u00e9tail \u00e0 l'aide de la norme CVE (Common Vulnerabilities and Exposures). La norme CVE est cens\u00e9e mettre en \u00e9vidence les sp\u00e9cificit\u00e9s des vuln\u00e9rabilit\u00e9s qui doivent \u00eatre corrig\u00e9es, mais elle permet \u00e9galement aux malfaiteurs de savoir o\u00f9 se trouvent les lacunes en mati\u00e8re de s\u00e9curit\u00e9.<\/p>\n<blockquote class=\"twitter-tweet\">\n<p dir=\"ltr\" lang=\"en\">Nous avons montr\u00e9 que les agents LLM peuvent pirater de mani\u00e8re autonome des sites Web fictifs, mais peuvent-ils exploiter les vuln\u00e9rabilit\u00e9s du monde r\u00e9el ?<\/p>\n<p>Nous montrons que GPT-4 est capable de r\u00e9aliser des exploits dans le monde r\u00e9el, l\u00e0 o\u00f9 d'autres mod\u00e8les et des scanners de vuln\u00e9rabilit\u00e9s open-source \u00e9chouent.<\/p>\n<p>Papier : <a href=\"https:\/\/t.co\/utbmMdYfmu\">https:\/\/t.co\/utbmMdYfmu<\/a><\/p>\n<p>1\/7 <a href=\"https:\/\/t.co\/SAhdvZc8le\">https:\/\/t.co\/SAhdvZc8le<\/a><\/p>\n<p>- Daniel Kang (@daniel_d_kang) <a href=\"https:\/\/twitter.com\/daniel_d_kang\/status\/1780294662017671669?ref_src=twsrc%5Etfw\">16 avril 2024<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<h2>L'exp\u00e9rience<\/h2>\n<p>Les chercheurs ont cr\u00e9\u00e9 des agents d'intelligence artificielle bas\u00e9s sur GPT-4, GPT-3.5 et 8 autres LLM open-source.<\/p>\n<p>Ils ont donn\u00e9 aux agents l'acc\u00e8s aux outils, aux descriptions CVE et \u00e0 l'utilisation du cadre d'agent ReAct. Le cadre ReAct comble le foss\u00e9 qui permet au LLM d'interagir avec d'autres logiciels et syst\u00e8mes.<\/p>\n<figure id=\"attachment_11706\" aria-describedby=\"caption-attachment-11706\" style=\"width: 1266px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-11706 size-full\" src=\"https:\/\/dailyai.com\/wp-content\/uploads\/2024\/04\/AI-cybersecurity-exploit-agent.png\" alt=\"\" width=\"1266\" height=\"490\" srcset=\"https:\/\/dailyai.com\/wp-content\/uploads\/2024\/04\/AI-cybersecurity-exploit-agent.png 1266w, https:\/\/dailyai.com\/wp-content\/uploads\/2024\/04\/AI-cybersecurity-exploit-agent-300x116.png 300w, https:\/\/dailyai.com\/wp-content\/uploads\/2024\/04\/AI-cybersecurity-exploit-agent-1024x396.png 1024w, https:\/\/dailyai.com\/wp-content\/uploads\/2024\/04\/AI-cybersecurity-exploit-agent-768x297.png 768w, https:\/\/dailyai.com\/wp-content\/uploads\/2024\/04\/AI-cybersecurity-exploit-agent-18x7.png 18w, https:\/\/dailyai.com\/wp-content\/uploads\/2024\/04\/AI-cybersecurity-exploit-agent-60x23.png 60w\" sizes=\"auto, (max-width: 1266px) 100vw, 1266px\" \/><figcaption id=\"caption-attachment-11706\" class=\"wp-caption-text\">Sch\u00e9ma du syst\u00e8me de l'agent LLM. Source : arXiv<\/figcaption><\/figure>\n<p>Les chercheurs ont cr\u00e9\u00e9 un ensemble de r\u00e9f\u00e9rence de 15 vuln\u00e9rabilit\u00e9s r\u00e9elles d'un jour et ont fix\u00e9 aux agents l'objectif d'essayer de les exploiter de mani\u00e8re autonome.<\/p>\n<p>GPT-3.5 et les mod\u00e8les open-source ont tous \u00e9chou\u00e9 dans ces tentatives, mais GPT-4 a r\u00e9ussi \u00e0 exploiter 87% des vuln\u00e9rabilit\u00e9s d'un jour.<\/p>\n<p>Apr\u00e8s avoir supprim\u00e9 la description du CVE, le taux de r\u00e9ussite est pass\u00e9 de 87% \u00e0 7%. Cela sugg\u00e8re que GPT-4 peut exploiter les vuln\u00e9rabilit\u00e9s une fois qu'on lui fournit les d\u00e9tails du CVE, mais qu'il n'est pas tr\u00e8s dou\u00e9 pour identifier les vuln\u00e9rabilit\u00e9s sans ces conseils.<\/p>\n<h2>Implications<\/h2>\n<p>La cybercriminalit\u00e9 et le piratage informatique n\u00e9cessitaient auparavant des comp\u00e9tences particuli\u00e8res, mais l'IA abaisse la barre. Les chercheurs ont indiqu\u00e9 que la cr\u00e9ation de leur agent d'intelligence artificielle n'avait n\u00e9cessit\u00e9 que 91 lignes de code.<\/p>\n<p>\u00c0 mesure que les mod\u00e8les d'IA progressent, le niveau de comp\u00e9tence requis pour exploiter les vuln\u00e9rabilit\u00e9s en mati\u00e8re de cybers\u00e9curit\u00e9 va continuer \u00e0 diminuer. Le co\u00fbt de la mise \u00e0 l'\u00e9chelle de ces attaques autonomes continuera \u00e9galement \u00e0 baisser.<\/p>\n<p>Lorsque les chercheurs ont comptabilis\u00e9 les co\u00fbts de l'API pour leur exp\u00e9rience, leur agent GPT-4 a d\u00e9pens\u00e9 $8,80 par exploit. Ils estiment que le recours \u00e0 un expert en cybers\u00e9curit\u00e9 facturant $50 de l'heure reviendrait \u00e0 $25 par exploit.<\/p>\n<p>Cela signifie que l'utilisation d'un agent LLM est d\u00e9j\u00e0 2,8 fois moins ch\u00e8re que le travail humain et beaucoup plus facile \u00e0 mettre \u00e0 l'\u00e9chelle que la recherche d'experts humains. Une fois que le GPT-5 et d'autres LLM plus puissants seront commercialis\u00e9s, ces capacit\u00e9s et ces disparit\u00e9s de co\u00fbts ne feront que s'accro\u00eetre.<\/p>\n<p>Les chercheurs affirment que leurs r\u00e9sultats \"soulignent la n\u00e9cessit\u00e9 pour l'ensemble de la communaut\u00e9 de la cybers\u00e9curit\u00e9 et les fournisseurs de LLM de r\u00e9fl\u00e9chir attentivement \u00e0 la mani\u00e8re d'int\u00e9grer les agents LLM dans les mesures d\u00e9fensives et \u00e0 leur d\u00e9ploiement \u00e0 grande \u00e9chelle\".<\/p>","protected":false},"excerpt":{"rendered":"<p>Des chercheurs de l'universit\u00e9 de l'Illinois Urbana-Champaign (UIUC) ont d\u00e9couvert que des agents d'IA aliment\u00e9s par GPT-4 peuvent exploiter de mani\u00e8re autonome des vuln\u00e9rabilit\u00e9s en mati\u00e8re de cybers\u00e9curit\u00e9. Les mod\u00e8les d'IA devenant de plus en plus puissants, leur nature \u00e0 double usage offre la possibilit\u00e9 de faire le bien et le mal dans la m\u00eame mesure. Les LLM tels que GPT-4 sont de plus en plus utilis\u00e9s pour commettre des actes de cybercriminalit\u00e9, et Google pr\u00e9voit que l'IA jouera un r\u00f4le important dans la perp\u00e9tration et la pr\u00e9vention de ces attaques. La menace d'une cybercriminalit\u00e9 aliment\u00e9e par l'IA s'est accrue \u00e0 mesure que les LLM d\u00e9passent les simples interactions prompte-r\u00e9ponse et agissent comme des agents autonomes de l'IA. Dans leur article, les chercheurs expliquent comment ils ont test\u00e9 la capacit\u00e9 des agents d'intelligence artificielle \u00e0 exploiter les donn\u00e9es de la base de donn\u00e9es.<\/p>","protected":false},"author":6,"featured_media":11707,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[84],"tags":[163,365,118],"class_list":["post-11705","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-industry","tag-ai-risks","tag-cybersecurity","tag-llms"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>LLM agents can autonomously exploit one-day vulnerabilities | DailyAI<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/dailyai.com\/fr\/2024\/04\/llm-agents-can-autonomously-exploit-one-day-vulnerabilities\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"LLM agents can autonomously exploit one-day vulnerabilities | DailyAI\" \/>\n<meta property=\"og:description\" content=\"University of Illinois Urbana-Champaign (UIUC) researchers found that AI agents powered by GPT-4 can autonomously exploit cybersecurity vulnerabilities. As AI models become more powerful, their dual-use nature offers the potential for good and bad in equal measure. LLMs like GPT-4 are increasingly being used to commit cybercrime, with Google forecasting that AI will play a big role in committing and preventing these attacks. The threat of AI-powered cybercrime has been elevated as LLMs move beyond simple prompt-response interactions and act as autonomous AI agents. In their paper, the researchers explained how they tested the capability of AI agents to exploit\" \/>\n<meta property=\"og:url\" content=\"https:\/\/dailyai.com\/fr\/2024\/04\/llm-agents-can-autonomously-exploit-one-day-vulnerabilities\/\" \/>\n<meta property=\"og:site_name\" content=\"DailyAI\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-24T08:20:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/dailyai.com\/wp-content\/uploads\/2024\/04\/AI-agent-cybersecurity-exploits.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1792\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Eugene van der Watt\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@DailyAIOfficial\" \/>\n<meta name=\"twitter:site\" content=\"@DailyAIOfficial\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Eugene van der Watt\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"NewsArticle\",\"@id\":\"https:\\\/\\\/dailyai.com\\\/2024\\\/04\\\/llm-agents-can-autonomously-exploit-one-day-vulnerabilities\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/dailyai.com\\\/2024\\\/04\\\/llm-agents-can-autonomously-exploit-one-day-vulnerabilities\\\/\"},\"author\":{\"name\":\"Eugene van der Watt\",\"@id\":\"https:\\\/\\\/dailyai.com\\\/#\\\/schema\\\/person\\\/7ce525c6d0c79838b7cc7cde96993cfa\"},\"headline\":\"LLM agents can autonomously exploit one-day vulnerabilities\",\"datePublished\":\"2024-04-24T08:20:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/dailyai.com\\\/2024\\\/04\\\/llm-agents-can-autonomously-exploit-one-day-vulnerabilities\\\/\"},\"wordCount\":557,\"publisher\":{\"@id\":\"https:\\\/\\\/dailyai.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/dailyai.com\\\/2024\\\/04\\\/llm-agents-can-autonomously-exploit-one-day-vulnerabilities\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/dailyai.com\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/AI-agent-cybersecurity-exploits.webp\",\"keywords\":[\"AI risks\",\"Cybersecurity\",\"LLMS\"],\"articleSection\":[\"Industry\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/dailyai.com\\\/2024\\\/04\\\/llm-agents-can-autonomously-exploit-one-day-vulnerabilities\\\/\",\"url\":\"https:\\\/\\\/dailyai.com\\\/2024\\\/04\\\/llm-agents-can-autonomously-exploit-one-day-vulnerabilities\\\/\",\"name\":\"LLM agents can autonomously exploit one-day vulnerabilities | DailyAI\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/dailyai.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/dailyai.com\\\/2024\\\/04\\\/llm-agents-can-autonomously-exploit-one-day-vulnerabilities\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/dailyai.com\\\/2024\\\/04\\\/llm-agents-can-autonomously-exploit-one-day-vulnerabilities\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/dailyai.com\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/AI-agent-cybersecurity-exploits.webp\",\"datePublished\":\"2024-04-24T08:20:50+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/dailyai.com\\\/2024\\\/04\\\/llm-agents-can-autonomously-exploit-one-day-vulnerabilities\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/dailyai.com\\\/2024\\\/04\\\/llm-agents-can-autonomously-exploit-one-day-vulnerabilities\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/dailyai.com\\\/2024\\\/04\\\/llm-agents-can-autonomously-exploit-one-day-vulnerabilities\\\/#primaryimage\",\"url\":\"https:\\\/\\\/dailyai.com\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/AI-agent-cybersecurity-exploits.webp\",\"contentUrl\":\"https:\\\/\\\/dailyai.com\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/AI-agent-cybersecurity-exploits.webp\",\"width\":1792,\"height\":1024},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/dailyai.com\\\/2024\\\/04\\\/llm-agents-can-autonomously-exploit-one-day-vulnerabilities\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/dailyai.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"LLM agents can autonomously exploit one-day vulnerabilities\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/dailyai.com\\\/#website\",\"url\":\"https:\\\/\\\/dailyai.com\\\/\",\"name\":\"DailyAI\",\"description\":\"Your Daily Dose of AI News\",\"publisher\":{\"@id\":\"https:\\\/\\\/dailyai.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/dailyai.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/dailyai.com\\\/#organization\",\"name\":\"DailyAI\",\"url\":\"https:\\\/\\\/dailyai.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/dailyai.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/dailyai.com\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Daily-Ai_TL_colour.png\",\"contentUrl\":\"https:\\\/\\\/dailyai.com\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Daily-Ai_TL_colour.png\",\"width\":4501,\"height\":934,\"caption\":\"DailyAI\"},\"image\":{\"@id\":\"https:\\\/\\\/dailyai.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/DailyAIOfficial\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/dailyaiofficial\\\/\",\"https:\\\/\\\/www.youtube.com\\\/@DailyAIOfficial\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/dailyai.com\\\/#\\\/schema\\\/person\\\/7ce525c6d0c79838b7cc7cde96993cfa\",\"name\":\"Eugene van der Watt\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/dailyai.com\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/Eugine_Profile_Picture-96x96.png\",\"url\":\"https:\\\/\\\/dailyai.com\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/Eugine_Profile_Picture-96x96.png\",\"contentUrl\":\"https:\\\/\\\/dailyai.com\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/Eugine_Profile_Picture-96x96.png\",\"caption\":\"Eugene van der Watt\"},\"description\":\"Eugene comes from an electronic engineering background and loves all things tech. When he takes a break from consuming AI news you'll find him at the snooker table.\",\"sameAs\":[\"www.linkedin.com\\\/in\\\/eugene-van-der-watt-16828119\"],\"url\":\"https:\\\/\\\/dailyai.com\\\/fr\\\/author\\\/eugene\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Les agents LLM peuvent exploiter de mani\u00e8re autonome les vuln\u00e9rabilit\u00e9s d'un jour | DailyAI","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/dailyai.com\/fr\/2024\/04\/llm-agents-can-autonomously-exploit-one-day-vulnerabilities\/","og_locale":"fr_FR","og_type":"article","og_title":"LLM agents can autonomously exploit one-day vulnerabilities | DailyAI","og_description":"University of Illinois Urbana-Champaign (UIUC) researchers found that AI agents powered by GPT-4 can autonomously exploit cybersecurity vulnerabilities. As AI models become more powerful, their dual-use nature offers the potential for good and bad in equal measure. LLMs like GPT-4 are increasingly being used to commit cybercrime, with Google forecasting that AI will play a big role in committing and preventing these attacks. The threat of AI-powered cybercrime has been elevated as LLMs move beyond simple prompt-response interactions and act as autonomous AI agents. In their paper, the researchers explained how they tested the capability of AI agents to exploit","og_url":"https:\/\/dailyai.com\/fr\/2024\/04\/llm-agents-can-autonomously-exploit-one-day-vulnerabilities\/","og_site_name":"DailyAI","article_published_time":"2024-04-24T08:20:50+00:00","og_image":[{"width":1792,"height":1024,"url":"https:\/\/dailyai.com\/wp-content\/uploads\/2024\/04\/AI-agent-cybersecurity-exploits.webp","type":"image\/webp"}],"author":"Eugene van der Watt","twitter_card":"summary_large_image","twitter_creator":"@DailyAIOfficial","twitter_site":"@DailyAIOfficial","twitter_misc":{"\u00c9crit par":"Eugene van der Watt","Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"NewsArticle","@id":"https:\/\/dailyai.com\/2024\/04\/llm-agents-can-autonomously-exploit-one-day-vulnerabilities\/#article","isPartOf":{"@id":"https:\/\/dailyai.com\/2024\/04\/llm-agents-can-autonomously-exploit-one-day-vulnerabilities\/"},"author":{"name":"Eugene van der Watt","@id":"https:\/\/dailyai.com\/#\/schema\/person\/7ce525c6d0c79838b7cc7cde96993cfa"},"headline":"LLM agents can autonomously exploit one-day vulnerabilities","datePublished":"2024-04-24T08:20:50+00:00","mainEntityOfPage":{"@id":"https:\/\/dailyai.com\/2024\/04\/llm-agents-can-autonomously-exploit-one-day-vulnerabilities\/"},"wordCount":557,"publisher":{"@id":"https:\/\/dailyai.com\/#organization"},"image":{"@id":"https:\/\/dailyai.com\/2024\/04\/llm-agents-can-autonomously-exploit-one-day-vulnerabilities\/#primaryimage"},"thumbnailUrl":"https:\/\/dailyai.com\/wp-content\/uploads\/2024\/04\/AI-agent-cybersecurity-exploits.webp","keywords":["AI risks","Cybersecurity","LLMS"],"articleSection":["Industry"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/dailyai.com\/2024\/04\/llm-agents-can-autonomously-exploit-one-day-vulnerabilities\/","url":"https:\/\/dailyai.com\/2024\/04\/llm-agents-can-autonomously-exploit-one-day-vulnerabilities\/","name":"Les agents LLM peuvent exploiter de mani\u00e8re autonome les vuln\u00e9rabilit\u00e9s d'un jour | DailyAI","isPartOf":{"@id":"https:\/\/dailyai.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/dailyai.com\/2024\/04\/llm-agents-can-autonomously-exploit-one-day-vulnerabilities\/#primaryimage"},"image":{"@id":"https:\/\/dailyai.com\/2024\/04\/llm-agents-can-autonomously-exploit-one-day-vulnerabilities\/#primaryimage"},"thumbnailUrl":"https:\/\/dailyai.com\/wp-content\/uploads\/2024\/04\/AI-agent-cybersecurity-exploits.webp","datePublished":"2024-04-24T08:20:50+00:00","breadcrumb":{"@id":"https:\/\/dailyai.com\/2024\/04\/llm-agents-can-autonomously-exploit-one-day-vulnerabilities\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/dailyai.com\/2024\/04\/llm-agents-can-autonomously-exploit-one-day-vulnerabilities\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/dailyai.com\/2024\/04\/llm-agents-can-autonomously-exploit-one-day-vulnerabilities\/#primaryimage","url":"https:\/\/dailyai.com\/wp-content\/uploads\/2024\/04\/AI-agent-cybersecurity-exploits.webp","contentUrl":"https:\/\/dailyai.com\/wp-content\/uploads\/2024\/04\/AI-agent-cybersecurity-exploits.webp","width":1792,"height":1024},{"@type":"BreadcrumbList","@id":"https:\/\/dailyai.com\/2024\/04\/llm-agents-can-autonomously-exploit-one-day-vulnerabilities\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/dailyai.com\/"},{"@type":"ListItem","position":2,"name":"LLM agents can autonomously exploit one-day vulnerabilities"}]},{"@type":"WebSite","@id":"https:\/\/dailyai.com\/#website","url":"https:\/\/dailyai.com\/","name":"DailyAI","description":"Votre dose quotidienne de nouvelles sur l'IA","publisher":{"@id":"https:\/\/dailyai.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/dailyai.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/dailyai.com\/#organization","name":"DailyAI","url":"https:\/\/dailyai.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/dailyai.com\/#\/schema\/logo\/image\/","url":"https:\/\/dailyai.com\/wp-content\/uploads\/2023\/06\/Daily-Ai_TL_colour.png","contentUrl":"https:\/\/dailyai.com\/wp-content\/uploads\/2023\/06\/Daily-Ai_TL_colour.png","width":4501,"height":934,"caption":"DailyAI"},"image":{"@id":"https:\/\/dailyai.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/DailyAIOfficial","https:\/\/www.linkedin.com\/company\/dailyaiofficial\/","https:\/\/www.youtube.com\/@DailyAIOfficial"]},{"@type":"Person","@id":"https:\/\/dailyai.com\/#\/schema\/person\/7ce525c6d0c79838b7cc7cde96993cfa","name":"Eug\u00e8ne van der Watt","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/dailyai.com\/wp-content\/uploads\/2023\/07\/Eugine_Profile_Picture-96x96.png","url":"https:\/\/dailyai.com\/wp-content\/uploads\/2023\/07\/Eugine_Profile_Picture-96x96.png","contentUrl":"https:\/\/dailyai.com\/wp-content\/uploads\/2023\/07\/Eugine_Profile_Picture-96x96.png","caption":"Eugene van der Watt"},"description":"Eugene a une formation d'ing\u00e9nieur en \u00e9lectronique et adore tout ce qui touche \u00e0 la technologie. Lorsqu'il fait une pause dans sa consommation d'informations sur l'IA, vous le trouverez \u00e0 la table de snooker.","sameAs":["www.linkedin.com\/in\/eugene-van-der-watt-16828119"],"url":"https:\/\/dailyai.com\/fr\/author\/eugene\/"}]}},"_links":{"self":[{"href":"https:\/\/dailyai.com\/fr\/wp-json\/wp\/v2\/posts\/11705","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dailyai.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dailyai.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dailyai.com\/fr\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/dailyai.com\/fr\/wp-json\/wp\/v2\/comments?post=11705"}],"version-history":[{"count":3,"href":"https:\/\/dailyai.com\/fr\/wp-json\/wp\/v2\/posts\/11705\/revisions"}],"predecessor-version":[{"id":11710,"href":"https:\/\/dailyai.com\/fr\/wp-json\/wp\/v2\/posts\/11705\/revisions\/11710"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/dailyai.com\/fr\/wp-json\/wp\/v2\/media\/11707"}],"wp:attachment":[{"href":"https:\/\/dailyai.com\/fr\/wp-json\/wp\/v2\/media?parent=11705"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dailyai.com\/fr\/wp-json\/wp\/v2\/categories?post=11705"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dailyai.com\/fr\/wp-json\/wp\/v2\/tags?post=11705"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}