[Verse 1]
When chatbots spill your secrets out
And prompts get twisted all about
External hackers craft their bait
To steal your data through the gate
Customer records, names and more
Scattered across the digital floor
[Chorus]
Six types of trouble, know them well
Prompt injection rings the bell
Data leakage, phishing schemes
Training poison, vendor dreams
Classify the blast and scope
Preserve the logs, maintain your hope
[Verse 2]
Internal workers bend the rules
Bypass restrictions in AI tools
While assistants leak restricted files
To external parties, breach compiles
Generated fraud emails arrive
Targeting executives who drive
[Chorus]
Six types of trouble, know them well
Prompt injection rings the bell
Data leakage, phishing schemes
Training poison, vendor dreams
Classify the blast and scope
Preserve the logs, maintain your hope
[Bridge]
When the incident unfolds
Revoke access, grab control
Preserve those prompts and traffic flows
Determine what the attacker knows
Regulatory bells may chime
Notify parties, fix in time
[Verse 3]
Backdoor triggers hide inside
Training datasets compromised
Supply chain vendors hold your trust
But breaches turn their logs to dust
Root cause analysis reveals
What went wrong behind the wheels
[Chorus]
Six types of trouble, know them well
Prompt injection rings the bell
Data leakage, phishing schemes
Training poison, vendor dreams
Classify the blast and scope
Preserve the logs, maintain your hope
[Outro]
Guardrails up and controls tight
Keep your AI systems right
When phishing strikes, preserve the code
Follow procedures, stay on road