{"description":"Hello there, ('\u03c9')\u30ce \u52d5\u753b youtu.be \u306a\u305c forms[1] \u304c\u524a\u9664\u30d5\u30a9\u30fc\u30e0\u306a\u306e\u304b\uff1f \u30e9\u30dc\u306e /my-account \u30da\u30fc\u30b8\u306e HTML \u30bd\u30fc\u30b9\u3092\u78ba\u8a8d\u3059\u308b\u3068\u3001\u6b21\u306e\u3088\u3046\u306b\u30d5\u30a9\u30fc\u30e0\u304c\u4e26\u3093\u3067\u3044\u307e\u3059\uff1a <form class=\"login-form\" name=\"change-email-form\" action=\"/my-account/change-email\" method=\"POST\"> ... </form> <form id=\"delete-account-form\" action=\"/my-account/delete\" method=\"POST\"> <inpu\u2026","image_url":null,"provider_url":"https://hatena.blog","version":"1.0","author_name":"ThisIsOne","height":"190","provider_name":"Hatena Blog","blog_title":"Shikata Ga Nai","published":"2025-09-21 06:50:07","url":"https://cysec148.hatenablog.com/entry/2025/09/21/065007","title":"Lab: Exploiting insecure output handling in LLMs \u2014 \u89e3\u8aac\u3068\u624b\u9806","type":"rich","html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2Fcysec148.hatenablog.com%2Fentry%2F2025%2F09%2F21%2F065007\" title=\"Lab: Exploiting insecure output handling in LLMs \u2014 \u89e3\u8aac\u3068\u624b\u9806 - Shikata Ga Nai\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>","categories":["Web Security Academy","LLM attacks"],"blog_url":"https://cysec148.hatenablog.com/","author_url":"https://blog.hatena.ne.jp/ThisIsOne/","width":"100%"}