These exploits are fascinating. I like the examples in the GPT-4 System Card paper (<a href="https://cdn.openai.com/papers/gpt-4-system-card.pdf" rel="nofollow">https://cdn.openai.com/papers/gpt-4-system-card.pdf</a>).