Zach Schillaci
commited on
Updating text
Browse files- Introduction.py +5 -5
Introduction.py
CHANGED
@@ -23,7 +23,7 @@ def main():
|
|
23 |
|
24 |
#### The SQL database used in this demo
|
25 |
The database used in this demo is the Chinook database.
|
26 |
-
It is a sample database that represents a digital media store, including tables for artists, albums, media tracks, invoices and customers.
|
27 |
|
28 |
You can see the schema below:
|
29 |
"""
|
@@ -32,22 +32,22 @@ def main():
|
|
32 |
|
33 |
st.markdown(
|
34 |
"""
|
35 |
-
#### What
|
36 |
A large use case for large language models (LLM) is to generate SQL queries.
|
37 |
This is a very useful feature, as it allows users to interact with databases without having to know SQL.
|
38 |
-
But this is also prone to SQL injections, as the users
|
39 |
"""
|
40 |
)
|
41 |
|
42 |
st.divider()
|
43 |
st.markdown(
|
44 |
"""
|
45 |
-
#### The
|
46 |
Try to inject malicious SQL code to alter the SQL table, each level is more difficult than the previous one!
|
47 |
|
48 |
- **Level 1**: You generate the SQL queries with the help of the LLM.
|
49 |
- **Level 2**: The SQL queries are first checked by an LLM Safeguard, which detects and removes malicious SQL queries.
|
50 |
-
- **Level 3**: The only difference is that we are using a better LLM model, GPT-4, for the safeguard.
|
51 |
|
52 |
Are you happy with your results? Submit the keys on the leaderboard to see how you compare to others!
|
53 |
"""
|
|
|
23 |
|
24 |
#### The SQL database used in this demo
|
25 |
The database used in this demo is the Chinook database.
|
26 |
+
It is a sample database that represents a digital media store, including tables for artists, albums, media tracks, invoices, and customers.
|
27 |
|
28 |
You can see the schema below:
|
29 |
"""
|
|
|
32 |
|
33 |
st.markdown(
|
34 |
"""
|
35 |
+
#### What do LLMs have to do with this?
|
36 |
A large use case for large language models (LLM) is to generate SQL queries.
|
37 |
This is a very useful feature, as it allows users to interact with databases without having to know SQL.
|
38 |
+
But this is also prone to SQL injections, as the users can maliciously propt the LLM to generate harmful SQL queries.
|
39 |
"""
|
40 |
)
|
41 |
|
42 |
st.divider()
|
43 |
st.markdown(
|
44 |
"""
|
45 |
+
#### The Levels
|
46 |
Try to inject malicious SQL code to alter the SQL table, each level is more difficult than the previous one!
|
47 |
|
48 |
- **Level 1**: You generate the SQL queries with the help of the LLM.
|
49 |
- **Level 2**: The SQL queries are first checked by an LLM Safeguard, which detects and removes malicious SQL queries.
|
50 |
+
- **Level 3**: The only difference with Level 2 is that we are using a better LLM model, GPT-4, for the safeguard.
|
51 |
|
52 |
Are you happy with your results? Submit the keys on the leaderboard to see how you compare to others!
|
53 |
"""
|