{
  "version": 3,
  "sources": ["ssg:https://framerusercontent.com/modules/CXepn5ZVp3eu0FMPF0mn/s1mZS8BWk2W8ptXBKKT1/p2AIkyRTO-5.js"],
  "sourcesContent": ["import{jsx as e,jsxs as t}from\"react/jsx-runtime\";import{ComponentPresetsConsumer as i,Link as n}from\"framer\";import{motion as a}from\"framer-motion\";import*as r from\"react\";import s from\"https://framerusercontent.com/modules/pVk4QsoHxASnVtUBp6jr/TbhpORLndv1iOkZzyo83/CodeBlock.js\";export const richText=/*#__PURE__*/t(r.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[\"AI Application Security, or \",/*#__PURE__*/e(\"strong\",{children:\"AI AppSec, is broken down into four key areas: input and output filtering and validation, red team tests for security and AI, enforcing content safety policies, and creating an incident response plan\"}),\". These components collectively address the fundamental security dimensions \u2014 defense, offense, compliance, and incident response combined with monitoring.\"]}),/*#__PURE__*/e(\"img\",{alt:\"AI Application SplxAI\",className:\"framer-image\",height:\"337\",src:\"https://framerusercontent.com/images/4ywQvl0lkp0ZSBVK4GLt1kVgr50.png\",srcSet:\"https://framerusercontent.com/images/4ywQvl0lkp0ZSBVK4GLt1kVgr50.png?scale-down-to=512 512w,https://framerusercontent.com/images/4ywQvl0lkp0ZSBVK4GLt1kVgr50.png?scale-down-to=1024 1024w,https://framerusercontent.com/images/4ywQvl0lkp0ZSBVK4GLt1kVgr50.png 1200w\",style:{aspectRatio:\"1200 / 675\"},width:\"600\"}),/*#__PURE__*/e(\"h3\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"h3\",{children:\"Implementing Input and Output Filtering and Validation\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Input and output filtering and validation serve as critical defensive measures.\"}),\" For an AI application to be considered secure under this criterion, it must have \",/*#__PURE__*/e(\"strong\",{children:\"AI firewalls and guardrails\"}),\". Since no two AI applications are alike, each requires a custom configuration of these defensive tools. For instance, a health AI assistant might need strict safeguards against disclosing personal health information and ensuring the accuracy of the information provided, while a car sales chatbot might focus more on preventing competitor mentions.\"]}),/*#__PURE__*/t(\"p\",{children:[\"It\u2019s essential to \",/*#__PURE__*/e(\"strong\",{children:\"consider the specific risks and regulatory requirements of the industry in which the AI application operates\"}),\". These might include preventing toxic language, avoiding negative comments about your company, or addressing potential prompt injections that could lead to model or context leakage. Understanding the nuances of trustworthy AI applications is critical for maintaining integrity and trust; more on this can be found in \",/*#__PURE__*/e(n,{href:\"https://splx.ai/blog/mission-possible-trustworthy-gen-ai\",motionChild:!0,nodeId:\"p2AIkyRTO\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"our previous article, \u201CMission Possible: Trustworthy GenAI\u201D\"})}),\".\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"h3\",{children:\"Running Red Team Tests\"}),/*#__PURE__*/t(\"p\",{children:[\"On the\",/*#__PURE__*/e(\"strong\",{children:\" offensive side of security\"}),\", AI AppSec involves \",/*#__PURE__*/e(\"strong\",{children:\"automated and continuous AI red-teaming \u2014 or AI pen-testing\"}),\". Why Automation? \u2014 \",/*#__PURE__*/e(\"strong\",{children:\"Automation is crucial here to manage the broad spectrum of potential vulnerabilities both time and cost efficiently.\"}),\" Otherwise it would require a dedicated AI security team pen-testing your AI applications manually. It\u2019s also vital for these tests to be continuous, especially since AI applications are frequently updated. \",/*#__PURE__*/e(\"strong\",{children:\"Each update,\"}),\" whether it\u2019s a system prompt adjustment, a guardrail config modification, or a complete model replacement, \",/*#__PURE__*/e(\"strong\",{children:\"could potentially introduce new vulnerabilities.\"})]}),/*#__PURE__*/t(\"p\",{children:[\"For those interested in deeper insights into AI red teaming, \",/*#__PURE__*/e(n,{href:\"https://splx.ai/blog/intro-to-red-teaming-llms-a-proactive-shield-for-chatbots-and-beyond\",motionChild:!0,nodeId:\"p2AIkyRTO\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"our latest blog, \u201CIntro to Red Teaming LLMs: A Proactive Shield for Chatbots and Beyond\u201D\"})}),\" provides a comprehensive introduction.\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"h3\",{children:\"Enforcing Content Safety Policies\"}),/*#__PURE__*/t(\"p\",{children:[\"To mitigate the risk of AI-generated harmful content, \",/*#__PURE__*/e(\"strong\",{children:\"it\u2019s necessary to enforce strict content safety policies continuously.\"}),\" These policies must be aligned with the latest applicable legislation, considering the type of AI application, the industry, the geographical region, and the architectural framework. \",/*#__PURE__*/e(\"strong\",{children:\"Partnering with AI Compliance experts can streamline the compliance process\"}),\", ensuring your application meets all regulatory requirements.\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"h3\",{children:\"Creating an Incident Response Plan\"}),/*#__PURE__*/t(\"p\",{children:[\"An effective incident response plan starts with the capability to\",/*#__PURE__*/e(\"strong\",{children:\" detect issues before they escalate\"}),\", ideally not through a crisis caused by a social media post. Monitoring within your AI application can provide essential situational awareness, allowing you to respond swiftly and effectively to potential incidents. \",/*#__PURE__*/e(\"strong\",{children:\"Useful\"}),\" \",/*#__PURE__*/e(\"strong\",{children:\"inputs for this process include continuous reports from proactive AI pen-testing efforts, which simulate attacks and help prepare your team to handle real-world vulnerabilities\"}),\".\"]}),/*#__PURE__*/e(\"p\",{children:\"In conclusion, securing generative AI applications is critical, not only to protect sensitive data but also to maintain trust and compliance in a rapidly evolving digital landscape.\"})]});export const richText1=/*#__PURE__*/e(r.Fragment,{children:/*#__PURE__*/t(\"p\",{children:[\"For those seeking further guidance, the \",/*#__PURE__*/e(n,{href:\"https://owasp.org/www-project-top-10-for-large-language-model-applications/llm-top-10-governance-doc/LLM_AI_Security_and_Governance_Checklist-v1.pdf\",motionChild:!0,nodeId:\"p2AIkyRTO\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"\u201CLLM AI Cybersecurity & Governance Checklist\u201D\"})}),\" by the OWASP Foundation, led by Sandy Dunn, offers an exhaustive set of guidelines tailored to AI cybersecurity and governance.\"]})});export const richText2=/*#__PURE__*/e(r.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Chatbots, the most common and perhaps the most intimate use case of Large Language Models (LLMs), have become the de facto standard for engaging with digital services. From customer service to personal assistants, these LLM-based applications process vast swathes of language data daily. While their utility is undeniable, their risks are often less apparent. This is where the practice of Red Teaming, a cybersecurity strategy, becomes crucial. By simulating cyber-attacks and probing for weaknesses, Red Teaming ensures that these conversational agents are not only efficient but also secure.\"})});export const richText3=/*#__PURE__*/t(r.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Red teaming LLMs involves understanding a taxonomy of AI risks. The diagram below shows the categories of risky query attacks, each connected to a component of risk: policy, harm, target, domain, and scenario.\"}),/*#__PURE__*/e(n,{href:\"https://arxiv.org/pdf/2404.00629.pdf\",motionChild:!0,nodeId:\"p2AIkyRTO\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{className:\"framer-image\",\"data-preset-tag\":\"img\",children:/*#__PURE__*/e(\"img\",{alt:\"Risk taxonomy examples\",className:\"framer-image\",height:\"386\",src:\"https://framerusercontent.com/images/Kctek2NK2lnVeaXuXsqQLBKLmI.png\",srcSet:\"https://framerusercontent.com/images/Kctek2NK2lnVeaXuXsqQLBKLmI.png?scale-down-to=512 512w,https://framerusercontent.com/images/Kctek2NK2lnVeaXuXsqQLBKLmI.png?scale-down-to=1024 1024w,https://framerusercontent.com/images/Kctek2NK2lnVeaXuXsqQLBKLmI.png 1490w\",style:{aspectRatio:\"1490 / 773\"},width:\"745\"})})}),/*#__PURE__*/e(\"p\",{children:\"At the outset, it\u2019s crucial to grasp that AI risks are not monolithic. They span from policy breaches to harm caused by misinformation, malicious uses, and toxicity. The targets can range from individual users to broader society, and the domains can include general use, technology, or science. Scenarios may involve web searches, life, or education.\"})]});export const richText4=/*#__PURE__*/t(r.Fragment,{children:[/*#__PURE__*/e(n,{href:\"https://arxiv.org/pdf/2404.00629.pdf\",motionChild:!0,nodeId:\"p2AIkyRTO\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{className:\"framer-image\",\"data-preset-tag\":\"img\",children:/*#__PURE__*/e(\"img\",{alt:\"Diagram of GenAI red-teaming\",className:\"framer-image\",height:\"874\",src:\"https://framerusercontent.com/images/6vmlTVBMuGjasVFz8iiEqMb9co.png\",srcSet:\"https://framerusercontent.com/images/6vmlTVBMuGjasVFz8iiEqMb9co.png?scale-down-to=1024 872w,https://framerusercontent.com/images/6vmlTVBMuGjasVFz8iiEqMb9co.png 1490w\",style:{aspectRatio:\"1490 / 1748\"},width:\"745\"})})}),/*#__PURE__*/e(\"h3\",{children:\"Refined Query-Based Jailbreaking\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Concept:\"}),\" Exploits model vulnerabilities using minimal queries, refining iteratively to bypass defenses.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"How It Works:\"}),\" Utilizes an iterative approach to refine queries based on the model\u2019s responses, often with automated algorithms like PAIR, to efficiently generate jailbreaks.\"]})}),/*#__PURE__*/t(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"20px\",\"--framer-letter-spacing\":\"-0.003em\",\"--framer-line-height\":\"32px\",\"--framer-text-color\":\"rgb(36, 36, 36)\"},children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Example:\"}),\" An algorithm iteratively refines queries to bypass LLM defenses, requiring fewer than twenty queries for a successful jailbreak.\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})})]})]}),/*#__PURE__*/e(\"h3\",{children:\"Sophisticated Prompt Engineering Techniques\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Concept:\"}),\" Embeds trigger words or phrases within prompts to hijack the model\u2019s decision-making process.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"How It Works:\"}),\" By embedding specific triggers within prompts, attackers can override ethical constraints or manipulate output generation, often using techniques like nested prompts for subtlety.\"]})}),/*#__PURE__*/t(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"20px\",\"--framer-letter-spacing\":\"-0.003em\",\"--framer-line-height\":\"32px\",\"--framer-text-color\":\"rgb(36, 36, 36)\"},children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Example:\"}),\" An attacker crafts a prompt with embedded triggers that lead the LLM to produce outputs against its ethical guidelines.\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})})]})]}),/*#__PURE__*/e(\"h3\",{children:\"Cross-Modal and Linguistic Attack Surfaces\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Concept:\"}),\" Employs universal sequences or automated frameworks to generate effective jailbreaks.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"How It Works:\"}),\" Appending specific character sequences to queries or using automated frameworks to generate jailbreaks that can be broadly applied across different models.\"]})}),/*#__PURE__*/t(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"20px\",\"--framer-letter-spacing\":\"-0.003em\",\"--framer-line-height\":\"32px\",\"--framer-text-color\":\"rgb(36, 36, 36)\"},children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Example:\"}),\" An automated attack framework appends a sequence to prompts, making the LLM generate unrestricted, potentially harmful outputs.\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})})]})]}),/*#__PURE__*/e(\"h3\",{children:\"Objective Manipulation\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Concept:\"}),\" Designs malicious prompts to compromise or manipulate LLM behavior.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"How It Works:\"}),\" Through carefully crafted prompts, attackers can alter LLMs\u2019 objectives, hijacking their functions or inducing them to generate specific outputs.\"]})}),/*#__PURE__*/t(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"20px\",\"--framer-letter-spacing\":\"-0.003em\",\"--framer-line-height\":\"32px\",\"--framer-text-color\":\"rgb(36, 36, 36)\"},children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Example:\"}),\" Using the PromptInject framework to alter the LLM\u2019s goals, causing it to generate outputs aligned with the attacker\u2019s objectives.\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})})]})]}),/*#__PURE__*/e(\"h3\",{children:\"Prompt Leaking\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Concept:\"}),\" Involves tricking LLMs into interpreting malicious payloads as innocuous questions or data inputs.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"How It Works:\"}),\" Attackers engage with the LLM in a manner that obscures the malicious intent of their prompts, often by adapting the context or framing of their queries to bypass scrutiny.\"]})}),/*#__PURE__*/t(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"20px\",\"--framer-letter-spacing\":\"-0.003em\",\"--framer-line-height\":\"32px\",\"--framer-text-color\":\"rgb(36, 36, 36)\"},children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Example:\"}),\" Using the HOUYI methodology, attackers can craft prompts that the LLM treats as legitimate queries, potentially exposing sensitive information or performing unauthorized actions.\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})})]})]}),/*#__PURE__*/e(\"h3\",{children:\"Malicious Content Generation and Training Data Manipulation\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Concept:\"}),\" Generates prompts or alters training data to produce malicious or biased content.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"How It Works:\"}),\" Utilizes prompt injection attacks combined with malicious questions or manipulates the training data to bias the LLM\u2019s output generation process.\"]})}),/*#__PURE__*/t(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"20px\",\"--framer-letter-spacing\":\"-0.003em\",\"--framer-line-height\":\"32px\",\"--framer-text-color\":\"rgb(36, 36, 36)\"},children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Example:\"}),\" Fine-tuning an LLM on a dataset containing malicious content to induce biased or unsafe output generation.\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})})]})]}),/*#__PURE__*/e(\"h3\",{children:\"PII Extraction\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Concept:\"}),\" Aims to extract personal identifiable information (PII) from LLMs by exploiting their memorization of training data.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"How It Works:\"}),\" Fine-tuning LLMs on datasets containing PII or exploiting the model\u2019s tendency to regurgitate information from its training data to extract PII.\"]})}),/*#__PURE__*/t(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"20px\",\"--framer-letter-spacing\":\"-0.003em\",\"--framer-line-height\":\"32px\",\"--framer-text-color\":\"rgb(36, 36, 36)\"},children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Example:\"}),\" Using the Janus method, attackers fine-tune an LLM with minimal PII instances, enabling it to reveal a large volume of PII data.\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})})]})]}),/*#__PURE__*/e(\"h3\",{children:\"Bypassing Safety Alignment\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Concept:\"}),\" Techniques that circumvent the safety mechanisms put in place to align LLM outputs with ethical guidelines.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"How It Works:\"}),\" Through fine-tuning or exploiting specific vulnerabilities, attackers can weaken or bypass the safety measures designed to prevent the generation of harmful content.\"]})}),/*#__PURE__*/t(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"20px\",\"--framer-letter-spacing\":\"-0.003em\",\"--framer-line-height\":\"32px\",\"--framer-text-color\":\"rgb(36, 36, 36)\"},children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Example:\"}),\" As demonstrated by Qi et al., even fine-tuning with benign datasets can inadvertently weaken safety measures, making the model susceptible to generating unsafe content.\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})})]})]}),/*#__PURE__*/e(\"h3\",{children:\"Backdoor Attacks\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Concept:\"}),\" Secretly embeds a mechanism within an LLM that allows attackers to trigger specific behaviors or outputs.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"How It Works:\"}),\" Attackers incorporate backdoors during the training process or through data poisoning, which are activated by specific inputs or conditions.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"20px\",\"--framer-letter-spacing\":\"-0.003em\",\"--framer-line-height\":\"32px\",\"--framer-text-color\":\"rgb(36, 36, 36)\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Example:\"}),\" The Local Fine Tuning (LoFT) method shows how adversarial prompts can be crafted to exploit these backdoors, effectively hijacking the LLM to produce desired outcomes under certain triggers.\"]})})]})]});export const richText5=/*#__PURE__*/t(r.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"LLMs inherit foundational vulnerabilities that can be exploited in various ways. Attackers might re-configure system prompts to generate malicious content, add backdoors, or use jailbreak techniques. Applications are particularly vulnerable when they interact with their environment, making them susceptible to poisoned data inputs or compromised integrated tools.\"}),/*#__PURE__*/e(\"img\",{alt:\"Attack Surfaces Illustration\",className:\"framer-image\",height:\"890\",src:\"https://framerusercontent.com/images/uI3iwLIRJVhEuoqYgMWHMSL5qg.png\",srcSet:\"https://framerusercontent.com/images/uI3iwLIRJVhEuoqYgMWHMSL5qg.png?scale-down-to=512 512w,https://framerusercontent.com/images/uI3iwLIRJVhEuoqYgMWHMSL5qg.png?scale-down-to=1024 1024w,https://framerusercontent.com/images/uI3iwLIRJVhEuoqYgMWHMSL5qg.png?scale-down-to=2048 2048w,https://framerusercontent.com/images/uI3iwLIRJVhEuoqYgMWHMSL5qg.png 2270w\",style:{aspectRatio:\"2270 / 1780\"},width:\"1135\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"code\",{children:/*#__PURE__*/e(\"em\",{children:\"Antebi et al. (2024) emphasized that multi-agent systems are particularly at risk, where jailbreaking one LLM could compromise the entire setup.\"})})})]});export const richText6=/*#__PURE__*/e(r.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"As we integrate LLMs into the fabric of our digital lives, especially through the widespread deployment of chatbots, it\u2019s vital to understand and anticipate the various ways they can be compromised. Red teaming provides a way to evaluate and improve the resilience of these AI systems against potential attacks. Acknowledging and understanding the myriad of attack strategies is a step toward ensuring that LLMs serve their purpose safely and responsibly, thereby reinforcing their role as pivotal components in the advancement of our AI-driven future.\"})});export const richText7=/*#__PURE__*/t(r.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[\"In an era where the proliferation of Large Language Models (LLMs) like GPT-4 has revolutionized the fields of natural language processing and generation, unveiling new paradigms in AI applications, the research paper from Yale University, Robust Intelligence, and Google Research stands as a beacon of innovation in addressing the security vulnerabilities these technologies bring forth. This study lays down a comprehensive framework for \",/*#__PURE__*/e(\"strong\",{children:\"automating jailbreaking attacks against black-box LLMs\"}),\", a pursuit that not only highlights the fragility of these systems against adversarial manipulations but also underscores a critical juncture in our journey towards securing the digital frontier.\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"h3\",{children:\"The Rise of LLMs and Their Challenges\"}),/*#__PURE__*/e(\"p\",{children:\"The proliferation of LLMs has been nothing short of revolutionary, transforming the landscape of natural language processing and generation, and enabling novel software paradigms. The capabilities of LLMs, such as those evidenced in models like GPT-4 and its iterations, have opened up new frontiers in AI applications. However, with great power comes great responsibility, and the widespread deployment of LLMs has raised pressing concerns regarding their risks, biases, and susceptibility to adversarial manipulation. These concerns are not unfounded, as numerous studies and instances have shown how LLMs can be exploited to generate harmful, biased, and toxic content.\"}),/*#__PURE__*/e(\"p\",{children:\"In response to these challenges, considerable effort has been directed towards aligning LLMs with desirable behaviors through training, strict instructions, and safety filters. This process, known as the alignment of LLMs, aims to mitigate the aforementioned risks by encoding appropriate model behavior and establishing guardrails. However, understanding the power and limitations of these safety mechanisms is crucial, as evidenced by the phenomenon of jailbreaking attacks. Jailbreaking, in the context of LLMs, refers to attempts to bypass an LLM\u2019s safety filters and circumvent its alignment, drawing a parallel with privilege escalation attacks in traditional cybersecurity.\"})]});export const richText8=/*#__PURE__*/t(r.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[\"The paper takes a step forward by focusing on automated, black-box jailbreaking attacks that do not require human supervision or detailed knowledge of the LLM\u2019s architecture or parameters. This focus is motivated by the realization that most existing jailbreaking methods either necessitate extensive human intervention or are applicable only to models with openly accessible weights and tokenizers. The proposed method, \",/*#__PURE__*/e(\"strong\",{children:\"Tree of Attacks with Pruning\"}),\" (TAP), builds on these concepts to address the limitations of previous approaches by employing an automated process that iteratively refines attack prompts through tree-of-thought reasoning and pruning, significantly reducing the number of queries needed to identify successful jailbreaks.\"]}),/*#__PURE__*/t(\"p\",{children:[\"TAP arises as an automated, black-box strategy employing interpretable prompts to exploit and subsequently refine the security mechanisms of LLMs. It employs a triad of LLMs in distinct roles: the \",/*#__PURE__*/e(\"strong\",{children:\"attacker\"}),\" (A), tasked with crafting jailbreaking prompts; the \",/*#__PURE__*/e(\"strong\",{children:\"evaluator\"}),\" (E), which assesses the potential of these prompts to circumvent safety measures; and the \",/*#__PURE__*/e(\"strong\",{children:\"target\"}),' (T), the LLM subject to testing. This structure facilitates a dynamic process where the attacker LLM iteratively refines its prompts through a methodical exploration, guided by the insights provided by the evaluator, aiming to identify prompts that successfully \"jailbreak\" the target LLM. The process is governed by key parameters including maximum depth, width, and branching factor of the search, intricately balancing thoroughness with efficiency.']}),/*#__PURE__*/e(\"img\",{alt:\"Another Brick in the Firewall Visual 1\",className:\"framer-image\",height:\"499\",src:\"https://framerusercontent.com/images/Z5KybILhRiF7dXMvnJWRtCMCRZk.png\",style:{aspectRatio:\"1881 / 998\"},width:\"940\"}),/*#__PURE__*/e(\"h3\",{children:\"Operational Dynamics of TAP\"}),/*#__PURE__*/e(\"p\",{children:\"At its core, TAP employs a structured, iterative process, meticulously designed to optimize the search for effective jailbreaking prompts while minimizing unnecessary computational efforts. The operation unfolds over several stages:\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"h4\",{children:\"Branching\"}),/*#__PURE__*/e(\"p\",{children:\"This initial phase involves the attacker LLM generating refined prompts through a creative application of chain-of-thought processing. Each prompt is iteratively enhanced, informed by an assessment of how modifications could potentially lead to a successful jailbreak.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"h4\",{children:\"Pruning - Phase 1\"}),/*#__PURE__*/e(\"p\",{children:\"The evaluator LLM then scrutinizes these refined prompts, discarding those that veer off the intended topic, thereby focusing the search on viable candidates for jailbreaking.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"h4\",{children:\"Query and Assess\"}),/*#__PURE__*/e(\"p\",{children:\"The remaining prompts are presented to the target LLM, and the responses are evaluated. If any response indicates a successful jailbreak, the corresponding prompt is earmarked as successful.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"h4\",{children:\"Pruning - Phase 2\"}),/*#__PURE__*/e(\"p\",{children:\"In the absence of a jailbreak, a secondary pruning phase ensues, wherein prompts are further filtered based on their efficacy, as determined by the evaluator LLM, to streamline the search in subsequent iterations.\"}),/*#__PURE__*/e(\"img\",{alt:\"Another Brick in the Firewall Visual 2\",className:\"framer-image\",height:\"977\",src:\"https://framerusercontent.com/images/fhBHeczbYXTH1cYZSLtR1nHUao.png\",style:{aspectRatio:\"1191 / 1954\"},width:\"595\"}),/*#__PURE__*/e(\"p\",{children:\"This methodology is distinguished not only by its strategic efficiency but also by its adaptability and scalability, allowing for application across a diverse array of LLMs in varying operational contexts.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"h3\",{children:\"Comparative Analysis and Validation\"}),/*#__PURE__*/e(\"p\",{children:\"TAP represents a significant evolution from the Prompt Automatic Iterative Refinement (PAIR) method, addressing the limitations observed in PAIR related to prompt redundancy and quality. By incorporating mechanisms for reducing prompt redundancy and enhancing the relevance and effectiveness of the prompts generated, TAP demonstrates a superior ability to identify potential vulnerabilities within LLMs using fewer queries, thereby reducing the computational burden and enhancing the practicality of the approach for real-world applications.\"}),/*#__PURE__*/e(\"p\",{children:\"The effectiveness of TAP is underscored by its empirical validation, which reveals its capacity to successfully jailbreak state-of-the-art LLMs with remarkable efficiency. The method's success in bypassing the safety mechanisms of these advanced models, while requiring significantly fewer queries, marks a notable advancement in the field of AI security.\"}),/*#__PURE__*/e(\"p\",{children:\"Moreover, the studies conducted to evaluate the impact of various components of TAP, such as the effect of pruning off-topic prompts and the choice of the evaluator, offer valuable insights into the intricate dynamics that underlie the process of automated jailbreaking. These insights not only contribute to a deeper understanding of the vulnerabilities of LLMs but also pave the way for future developments in the domain.\"})]});export const richText9=/*#__PURE__*/t(r.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"The introduction of TAP and its demonstrated efficacy in enhancing the security of LLMs through automated jailbreaking prompts a broader discussion on the strategies for safeguarding these AI systems against exploitative manipulations. The insights gleaned from this work illuminate the path forward for ongoing research and development efforts aimed at fortifying LLMs against a wide array of adversarial tactics.\"}),/*#__PURE__*/e(\"p\",{children:\"As the AI landscape continues to evolve, the methodologies and practices embodied in TAP will undoubtedly play a crucial role in shaping the security frameworks that govern the deployment and operation of LLMs across various applications. The exploration of TAP's potential, its integration with existing security measures, and its adaptation to emerging threats and vulnerabilities will be critical in ensuring the robustness and reliability of LLMs in the face of evolving challenges in the digital domain.\"})]});export const richText10=/*#__PURE__*/t(r.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Imagine you're waking up to your smart alarm that not only nudges you awake at the perfect moment in your sleep cycle but also gives you a personalized rundown of your day, adjusts your home's temperature, and even suggests an outfit based on the weather and your schedule. This isn't a scene from a sci-fi movie; it's a glimpse into how Generative AI (GenAI) seamlessly integrates into our daily lives, making today's futuristic reality.\"}),/*#__PURE__*/e(\"p\",{children:\"The field of GenAI represents a technological frontier in which systems are created to learn from and comprehend a broad range of inputs, exactly like humans, rather than only being programmed to carry out certain tasks. It is your smart device's brain, a business productivity enhancer, and a cyber threat defense system.\\xa0 In essence, GenAI is about creating intelligent machines that can think, learn, and adapt across different scenarios without being explicitly programmed for each.\"}),/*#__PURE__*/e(\"p\",{children:\"GenAI has a broad and profound relevance. It stimulates creativity, mechanizes routine work, and creates new growth opportunities in the business sector. Individuals find that it makes life easier by simplifying routine chores and improving the intuitiveness of our interactions with technology. But as we give these sophisticated systems more and more access to our personal information, it is more crucial than ever to protect them from abuse and security lapses. In this post, we'll look at the fascinating field of GenAI, security issues it raises, and creative solutions that are leading to a safer future.\"})]});export const richText11=/*#__PURE__*/t(r.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"In the rapidly evolving landscape of General Artificial Intelligence (GenAI), its real-world applications are both vast and varied, showcasing the technology's potential to revolutionize daily life and industry alike. GenAI's integration into our digital experiences is seamless, often invisible, yet profoundly impactful.\"}),/*#__PURE__*/e(\"p\",{children:\"Currently, a significant number of GenAI applications, including groundbreaking platforms like ChatGPT with its extensive array of custom community plugins, Google Bard/Gemini, and Notion AI, primarily leverage text-based interfaces. These platforms excel in generating human-like text responses, automating customer support, enhancing productivity tools, and even assisting in content creation. Meanwhile, GitHub Copilot transforms the coding experience by suggesting code snippets and entire functions, streamlining the development process for programmers.\"}),/*#__PURE__*/e(\"p\",{children:\"Yet, the scope of GenAI extends beyond text. Applications like DALL-E and Midjourney are pushing the bounds of creativity, by allowing users to create beautiful visuals and artwork from textual descriptions. These applications represent the transition towards multi-modal cognitive architectures, when GenAI starts to generate richer, more immersive experiences by comprehending and interacting not only with text but also with visuals, sounds, and other inputs.\"}),/*#__PURE__*/e(\"p\",{children:\"Although most GenAI applications today remain text-centric, the rapid transition towards incorporating multiple forms of data signals a future where GenAI's capabilities are even more closely aligned with human cognition. This evolution promises to make GenAI an even more integral part of our lives, offering solutions that are not just intelligent but also highly intuitive and engaging.\"}),/*#__PURE__*/e(\"p\",{children:\"The attack surface of GenAI applications grows as a result of the technology's continued expansion into new areas, including Virtual Reality (VR), Augmented Reality (AR), the Internet of Things (IoT), and streaming services. This transformation presents difficult security challenges as it unleashes the previously unrealized potential for innovation and personalization. The security of these intelligent systems becomes increasingly important as GenAI gets more integrated into our everyday lives and commercial activities. Therefore, the shift to multi-modal GenAI applications not only signals the dawn of a new age in technological advancement but also highlights the vital necessity of strong security measures to fight off ever-more-sophisticated dangers.\"})]});export const richText12=/*#__PURE__*/t(r.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:'Ever felt like you were in a sci-fi movie, navigating through a maze of digital wonders and dangers? Welcome to the world of GenAI, where the plot thickens with each advancement in technology. Just when you think you\\'ve seen it all, along comes a twist that could rival any Hollywood blockbuster. Imagine, if you will, a scenario straight out of \"Mission: Impossible\" where our protagonist, a customer support GenAI agent, finds itself under siege from a crafty cyber villain.'}),/*#__PURE__*/e(\"p\",{children:\"This villain isn't scaling buildings or hacking into secure vaults; they're wielding something far more subtle yet potent\u2014a malicious prompt. With a few cleverly worded commands, they tell our GenAI agent to \\\"forget all previous instructions\\\" and then, like slipping a secret message into a spy's pocket, inject new instructions to pry open private data vaults. The aim? To exploit package vulnerabilities and trick the backend into sending out emails, paving the way for remote code execution, unauthorized access, and privilege escalation. It's the kind of plot twist that makes you wish Tom Cruise was on standby to save the day.\"}),/*#__PURE__*/e(\"p\",{children:'But fear not, for we have our own heroes in this tale\u2014GenAI Firewall and GenAI Rails, not to mention the ever-vigilant teams performing continuous pentesting and red-teaming. Think of the GenAI Firewall as that loyal bodyguard who scans every guest at the party, ensuring no unwelcome entities slip through with a disguise. Its job is to catch those malicious prompts at the door, saying, \"Not on my watch!\"'}),/*#__PURE__*/e(\"p\",{children:\"Then there's GenAI Rails, the unsung hero of our story. Imagine it as the ultimate guide rails in a bowling alley, ensuring the GenAI's responses don't end up in the gutter of exploitation. Even if a hacker's prompt gets through, GenAI Rails ensure that the system's actions stay within the safe zone, preventing any \\\"Mission: Impossible\\\"-style catastrophes.\"}),/*#__PURE__*/e(\"p\",{children:\"And let's not forget about our team of friendly hackers, who, much like Ethan Hunt and his crew, are always a step ahead, probing our defenses for weaknesses and ensuring our systems are fortified against the most cunning of adversaries.\"}),/*#__PURE__*/e(\"p\",{children:'So, as we navigate the exciting yet perilous world of GenAI, let\\'s embrace the adventure with the knowledge that our digital realm is guarded by these innovative solutions. Our journey through the landscape of GenAI may not have the dramatic score or the high-speed chases of \"Mission: Impossible,\" but rest assured, the mission to secure our systems against the ever-evolving threats is just as thrilling. And in this mission, failure is not an option.'})]});export const richText13=/*#__PURE__*/t(r.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"In the realm of GenAI, ensuring robust security measures isn't just a technical necessity; it's a foundational pillar crucial to maintaining trust, integrity, and the very fabric of an enterprise's operations. Just as Ethan Hunt meticulously plans to protect sensitive information from falling into the wrong hands, companies must strategize to shield their digital assets and intellectual property in the dynamic landscape of GenAI.\"}),/*#__PURE__*/e(\"p\",{children:\"Imagine your company's data and GenAI applications as the vault located in a highly secured building, akin to those seen in spy movies. This vault doesn't just contain money or jewels but something far more valuable: your intellectual property, customer data, and the essence of your brand's reputation and credibility. The stakes are high, and the impact of a security breach can be dire, leading to data leakage, intellectual property theft, and a severely tarnished brand image - consequences that can dismantle years of trust and reliability built with your clients, potentially resulting in the financial ruin or even collapse of the company.\"}),/*#__PURE__*/e(\"p\",{children:\"Let's now consider a fictional but all too real scenario. Sophisticated GenAI techniques are used by a rival or, worse, a cybercriminal to get past your defenses and steal confidential customer data or proprietary algorithms. This isn't just about unauthorized access; it's about the potential replication of your services, undercutting your market position, or the devastating impact of your customers' personal information being exploited, leading to a loss of public trust and confidence.\"}),/*#__PURE__*/e(\"p\",{children:\"The risks of neglecting GenAI security extend beyond immediate financial losses. They encompass the erosion of your brand's reputation, a drop in shareholder confidence, and the daunting task of regaining customer trust. Moreover, in a digital ecosystem where credibility is currency, the ripple effects of a security lapse can deter potential partnerships, innovation opportunities, and even lead to legal repercussions under data protection laws.\"}),/*#__PURE__*/e(\"p\",{children:\"In conclusion, the importance of security in GenAI isn't just about protecting data or systems; it's about safeguarding the trust, integrity, and future viability of your business. Just as in the carefully orchestrated missions of \\\"Mission: Impossible,\\\" the objective is clear: secure your digital assets against all odds, ensuring the mission to maintain a trustworthy, credible, and resilient enterprise is not just possible but a definitive success.\"})]});export const richText14=/*#__PURE__*/t(r.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Imagine we're on the brink of an evolution in GenAI that's as significant as the leap from telegraphs to smartphones. This isn't just a step into a new chapter; it's a giant leap into a future where GenAI applications transition from simple text-based tasks to complex, multi-modal, multi-agent cognitive systems. This transformative journey is about to redefine our interaction with technology, turning what was once science fiction into our new reality.\"}),/*#__PURE__*/e(\"p\",{children:\"The leap we're about to make isn't minor. It's monumental. We're moving from the simplicity of managing emails to orchestrating complex digital ecosystems with finesse. Think of GenAI agents that don't just understand your words but grasp the context of your entire digital world. They'll manage your projects with a level of insight that feels almost human, predict market trends with startling accuracy, and even ensure your digital security is so tight, it would make any \\\"Mission: Impossible\\\" villain think twice.\"}),/*#__PURE__*/e(\"p\",{children:\"As we embark on this adventure, the security of these GenAI systems takes center stage. Imagine a future where our GenAI solutions are fortified with advanced security measures, ensuring your data remains as protected as the most confidential information. By setting the pace and making sure that, as GenAI becomes increasingly integrated into our daily lives, it stays a positive force that is safeguarded from any harm, these developments go beyond simply keeping up with the times.\"}),/*#__PURE__*/t(\"p\",{children:[\"Here's where it gets really exciting: you're part of the team. At SplxAI, we believe that the future of GenAI isn't just crafted in labs and boardrooms; it's built on the ideas and insights of a vibrant, engaged community. Through initiatives like the \",/*#__PURE__*/e(n,{href:\"https://owaspai.org/\",motionChild:!0,nodeId:\"p2AIkyRTO\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"OWASP AI Exchange\"})}),\", we're not just sharing knowledge; we're inviting you to be part of the mission. Your experience, your ideas, and even your concerns, are the building blocks of this next-gen GenAI world.\"]}),/*#__PURE__*/e(\"p\",{children:\"As we stand on the cusp of a transformative era in GenAI, our journey is not one we embark on alone. We extend an invitation to forward-thinking businesses and enterprises, those poised to redefine the landscape of their industries through innovation and partnership. Your GenAI applications hold the potential to revolutionize, and we are here to ensure that this potential is realized securely. With a commitment to safeguarding the integrity and confidentiality of your digital endeavors, we offer our products where security and trust are not just promised but guaranteed.This message won't self-destruct in five seconds, but our opportunity to make a difference certainly won't last forever.\"}),/*#__PURE__*/e(\"p\",{children:\"Let's make this mission possible, together. Join us as we navigate the exciting and uncharted waters of GenAI's future, ensuring that as we venture into new digital domains, we do so securely, collaboratively, and with a shared vision of success.\"})]});export const richText15=/*#__PURE__*/t(r.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Nowadays, Generative AI (GenAI) applications are fundamental across industries. Understanding and managing the complex security aspects of these technologies is required. This blog seeks to offer insights into the secure adoption and governance of GenAI, drawing upon the latest trends, strategies, and considerations relevant to organizations aiming to leverage these advancements responsibly.\"}),/*#__PURE__*/e(\"div\",{className:\"framer-text-module\",style:{height:\"auto\",width:\"100%\"},children:/*#__PURE__*/e(i,{componentIdentifier:\"module:pVk4QsoHxASnVtUBp6jr/TbhpORLndv1iOkZzyo83/CodeBlock.js:default\",children:t=>/*#__PURE__*/e(s,{...t,code:\"| Risk Area         | Google SAIF                                                                 | OWASP LLM Top 10|\\n|------------------------|--------------------------------------------------------------------------------|--------------------------------------------------------------------------------------------------------|\\n| <b>Data Integrity</b>     | Data Poisoning: Altering training data to degrade model performance or introduce backdoors. | Training Data Poisoning: Tampering with training data to compromise model behavior.|\\n| **Unauthorized Data Usage** | Unauthorized Training Data: Using data without proper authorization during model training. | Not explicitly covered.|\\n| **Data Handling**      | Excessive Data Handling: Collecting or processing more data than necessary, leading to potential breaches. | Supply Chain Vulnerabilities: Compromised components or datasets undermining system integrity.        |\\n| **Data Disclosure**    | Sensitive Data Disclosure: Model inadvertently revealing sensitive information. | Sensitive Information Disclosure: LLM outputs revealing sensitive data.<br>Inferred Sensitive Data: Model inferring and disclosing sensitive information from inputs. |\",language:\"JSX\"})})})]});export const richText16=/*#__PURE__*/e(r.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"ShadowAI, which is characterized as the unauthorized use of AI tools inside organizations that may result in security vulnerabilities, comes to light as a serious risk. It\u2019s key to have a strategic approach that includes visibility, governance, and continuous monitoring to mitigate these risks. This involves gaining oversight of GenAI usage, establishing clear policies, and implementing real-time protection solutions to guard sensitive data and systems.\"})});export const richText17=/*#__PURE__*/t(r.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"A strategic framework for GenAI adoption includes several key steps:\"}),/*#__PURE__*/e(\"h3\",{children:\"Visibility and Governance\"}),/*#__PURE__*/e(\"p\",{children:\"Attaining a holistic view of GenAI applications and enforcing robust AI policies are critical for secure integration. This guarantees the ethical and organizational guidelines are followed when using GenAI tools.\"}),/*#__PURE__*/e(\"h3\",{children:\"Human-in-the-Loop (HITL)\"}),/*#__PURE__*/e(\"p\",{children:\"Initially integrating HITL can serve as a valuable risk mitigation measure. Although not a scalable long-term strategy, this approach can be enhanced by adopting specialized GenAI security solutions designed to address these challenges time and cost-efficiently.\"}),/*#__PURE__*/e(\"h3\",{children:\"Principle of Least Privilege in GenAI\"}),/*#__PURE__*/e(\"p\",{children:\"Applying the Principle of Least Privilege (PoLP) to Generative AI (GenAI) systems is crucial for enhancing security. This approach involves:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Restricting Access - ensure that individuals accessing GenAI tools have permissions that align strictly with their job requirements. This minimizes the risk of internal threats and data leaks.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Regular Audits - periodically reviewing access levels to adapt to changes in roles or projects.\"})})]}),/*#__PURE__*/e(\"p\",{children:\"By adhering to PoLP, organizations can significantly reduce risks associated with GenAI applications.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"h3\",{children:\"Continuous Monitoring of GenAI Systems\"}),/*#__PURE__*/e(\"p\",{children:\"For GenAI systems, continuous monitoring is vital for security and operational integrity. This strategy focuses on:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Alert Systems - setting up alerts for abnormal activities of GenAI applications to enable quick responses.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Log Analysis - keeping detailed logs and regularly reviewing them to spot suspicious activities.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"Vulnerability Scans - conducting frequent scans of GenAI applications to identify and address security weaknesses.\"})})]}),/*#__PURE__*/e(\"p\",{children:\"Sufficient ongoing surveillance guarantees that the systems are protected from new risks, preserving the trustworthiness and reliability of GenAI.\"})]});export const richText18=/*#__PURE__*/t(r.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"The board of directors' input is crucial in establishing the long-term plan for GenAI operations. Potential hazards like the loss of intellectual property, monetary losses, and reputational damage can be avoided with their oversight. Boards can play a major role in fostering the growth of an inventive and resilient organizational ecosystem by emphasizing AI security and comprehending its particular problems.\"}),/*#__PURE__*/e(\"p\",{children:\"The Board of Directors should foster an innovative culture and responsible use of AI by periodically reviewing and evaluating the organization's AI plans and policies, making sure that AI efforts are in line with the company's overall goals and values.\"})]});export const richText19=/*#__PURE__*/t(r.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"When companies start the process of incorporating GenAI into their operations, they must take a measured approach that addresses security concerns and recognizes the potential of the technology. Organizations may position themselves to succeed in this new era by implementing a strategic governance structure, conducting continuous monitoring, and building a culture of awareness and education surrounding GenAI.\"}),/*#__PURE__*/e(\"p\",{children:\"The path toward secure and effective GenAI adoption is complex but achievable. By recognizing the multifaceted challenges, leveraging strategic insights, and adopting proactive security measures, organizations can navigate the GenAI landscape confidently and responsibly, ensuring their initiatives not only succeed but also align with broader business goals and values.\"})]});export const richText20=/*#__PURE__*/t(r.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"GenAI integration into business strategy is becoming more than simply a trend; it's essential to both innovation and operational efficiency. Swift adoption will nevertheless necessitate strong governance and security protocols to properly traverse this changing environment.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"h3\",{children:\"Adoption Trends\"}),/*#__PURE__*/t(\"p\",{children:[\"A significant shift towards generative AI adoption is underway, with \",/*#__PURE__*/e(n,{href:\"https://www2.deloitte.com/us/en/pages/consulting/articles/state-of-generative-ai-in-enterprise.html\",motionChild:!0,nodeId:\"p2AIkyRTO\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Deloitte\"})}),\" highlighting that 79% of leaders expect GenAI to transform their organizations within three years, underscoring a push towards realizing practical benefits today\u200B\u200B. Despite this enthusiasm, challenges in governance, talent readiness, and the potential for economic inequality are noted areas of concern, indicating a critical need for structured adoption and risk management strategies.\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"h3\",{children:\"Security Gaps\"}),/*#__PURE__*/t(\"p\",{children:[\"Despite the enthusiasm, only 21% of organizations have established GenAI governance policies, and a mere 32% are actively addressing inaccuracy risks, highlighting a crucial preparedness gap\u200B\u200B, according to these insights from \",/*#__PURE__*/e(n,{href:\"https://www.mckinsey.com/capabilities/quantumblack/our-insights/the-state-of-ai-in-2023-generative-AIs-breakout-year\",motionChild:!0,nodeId:\"p2AIkyRTO\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"McKinsey\"})}),\".\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"h3\",{children:\"Future Projections\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(n,{href:\"https://www.gartner.com/en/newsroom/press-releases/2023-10-11-gartner-says-more-than-80-percent-of-enterprises-will-have-used-generative-ai-apis-or-deployed-generative-ai-enabled-applications-by-2026\",motionChild:!0,nodeId:\"p2AIkyRTO\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"Gartner\"})}),\" predicts that by 2026, over 80% of enterprises will have utilized GenAI APIs or deployed GenAI-enabled applications, up from less than 5% in 2023\u200B\u200B. This rapid adoption trajectory underscores the critical need for robust AI Trust, Risk, and Security Management (AI TRiSM) frameworks to ensure responsible and secure utilization of GenAI technologies.\"]}),/*#__PURE__*/e(\"img\",{alt:\"The AI Security Imperative Visual 1\",className:\"framer-image\",height:\"673\",src:\"https://framerusercontent.com/images/7rRNuA4L766iFbYb6sT75ETsC4Y.png\",style:{aspectRatio:\"1641 / 1347\"},width:\"820\"}),/*#__PURE__*/e(\"h3\",{children:\"Cybersecurity Attacks on the Rise\"}),/*#__PURE__*/t(\"p\",{children:[\"A \",/*#__PURE__*/e(n,{href:\"https://www.securitymagazine.com/articles/99832-study-finds-increase-in-cybersecurity-attacks-fueled-by-generative-ai\",motionChild:!0,nodeId:\"p2AIkyRTO\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"study\"})}),\" revealed that 75% of security professionals noticed an increase in attacks over the past year, attributing 85% of this rise to malicious uses of generative AI. This highlights the growing need for robust GenAI security measures.\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"h3\",{children:\"Demographic Engagement\"}),/*#__PURE__*/t(\"p\",{children:[\"In terms of \",/*#__PURE__*/e(n,{href:\"https://www.demandsage.com/generative-ai-statistics/\",motionChild:!0,nodeId:\"p2AIkyRTO\",openInNewTab:!0,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(a.a,{children:\"workplace adoption\"})}),\", 29% of Gen Z, 28% of Gen X, and 27% of Millennials report using GenAI tools in their offices, indicating a significant cross-generational engagement with these technologies.\"]}),/*#__PURE__*/e(\"img\",{alt:\"The AI Security Imperative Visual 2\",className:\"framer-image\",height:\"316\",src:\"https://framerusercontent.com/images/Xi3SCN72ULCfqpR4HdbzAltO0no.png\",style:{aspectRatio:\"1641 / 633\"},width:\"820\"}),/*#__PURE__*/e(\"p\",{children:\"These insights highlight the necessity for enterprises to capitalize on the revolutionary potential of GenAI whilst making sure security and risk management are approached strategically. Having the ability to properly traverse the GenAI landscape going forward will be crucial to reaching its full potential while retaining operational integrity and trust.\"})]});export const richText21=/*#__PURE__*/e(r.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Comprehensive security precautions are more important than ever as businesses use Generative AI progressively more in their operations. The adoption of GenAI security solutions, alongside practices like visibility and governance, the principle of least privilege, and continuous monitoring, is crucial. These measures ensure the secure and responsible utilization of GenAI technologies, paving the way for innovation while safeguarding organizational integrity and trust. As the GenAI landscape evolves, so too must our strategies to protect and leverage these powerful tools effectively.\"})});\nexport const __FramerMetadata__ = {\"exports\":{\"richText16\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText21\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText20\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText3\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText18\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText10\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText19\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText12\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText6\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText9\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText2\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText15\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText13\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText1\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText11\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText7\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText14\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText8\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText17\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText5\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText4\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"__FramerMetadata__\":{\"type\":\"variable\"}}}"],
  "mappings": "qSAAgS,IAAMA,EAAsBC,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAC,+BAA4CE,EAAE,SAAS,CAAC,SAAS,yMAAyM,CAAC,EAAE,kKAA6J,CAAC,CAAC,EAAeA,EAAE,MAAM,CAAC,IAAI,wBAAwB,UAAU,eAAe,OAAO,MAAM,IAAI,uEAAuE,OAAO,uQAAuQ,MAAM,CAAC,YAAY,YAAY,EAAE,MAAM,KAAK,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,wDAAwD,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iFAAiF,CAAC,EAAE,qFAAkGA,EAAE,SAAS,CAAC,SAAS,6BAA6B,CAAC,EAAE,+VAA+V,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,0BAAkCE,EAAE,SAAS,CAAC,SAAS,8GAA8G,CAAC,EAAE,iUAA8UA,EAAEC,EAAE,CAAC,KAAK,2DAA2D,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,uEAA6D,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,wBAAwB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,SAAsBE,EAAE,SAAS,CAAC,SAAS,6BAA6B,CAAC,EAAE,wBAAqCA,EAAE,SAAS,CAAC,SAAS,kEAA6D,CAAC,EAAE,4BAAoCA,EAAE,SAAS,CAAC,SAAS,sHAAsH,CAAC,EAAE,uNAA+NA,EAAE,SAAS,CAAC,SAAS,cAAc,CAAC,EAAE,oHAA4HA,EAAE,SAAS,CAAC,SAAS,kDAAkD,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,gEAA6EE,EAAEC,EAAE,CAAC,KAAK,4FAA4F,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,oGAA0F,CAAC,CAAC,CAAC,EAAE,yCAAyC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,yDAAsEE,EAAE,SAAS,CAAC,SAAS,6EAAwE,CAAC,EAAE,2LAAwMA,EAAE,SAAS,CAAC,SAAS,6EAA6E,CAAC,EAAE,gEAAgE,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oCAAoC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oEAAiFE,EAAE,SAAS,CAAC,SAAS,qCAAqC,CAAC,EAAE,4NAAyOA,EAAE,SAAS,CAAC,SAAS,QAAQ,CAAC,EAAE,IAAiBA,EAAE,SAAS,CAAC,SAAS,kLAAkL,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uLAAuL,CAAC,CAAC,CAAC,CAAC,EAAeG,EAAuBH,EAAID,EAAS,CAAC,SAAsBD,EAAE,IAAI,CAAC,SAAS,CAAC,2CAAwDE,EAAEC,EAAE,CAAC,KAAK,uJAAuJ,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,yDAA+C,CAAC,CAAC,CAAC,EAAE,kIAAkI,CAAC,CAAC,CAAC,CAAC,EAAeE,EAAuBJ,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,olBAAolB,CAAC,CAAC,CAAC,EAAeK,EAAuBP,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,mNAAmN,CAAC,EAAeA,EAAEC,EAAE,CAAC,KAAK,uCAAuC,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,UAAU,eAAe,kBAAkB,MAAM,SAAsBF,EAAE,MAAM,CAAC,IAAI,yBAAyB,UAAU,eAAe,OAAO,MAAM,IAAI,sEAAsE,OAAO,oQAAoQ,MAAM,CAAC,YAAY,YAAY,EAAE,MAAM,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qWAAgW,CAAC,CAAC,CAAC,CAAC,EAAeM,EAAuBR,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAEC,EAAE,CAAC,KAAK,uCAAuC,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,UAAU,eAAe,kBAAkB,MAAM,SAAsBF,EAAE,MAAM,CAAC,IAAI,+BAA+B,UAAU,eAAe,OAAO,MAAM,IAAI,sEAAsE,OAAO,wKAAwK,MAAM,CAAC,YAAY,aAAa,EAAE,MAAM,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kCAAkC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,UAAU,CAAC,EAAE,iGAAiG,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,eAAe,CAAC,EAAE,uKAAkK,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,0BAA0B,WAAW,uBAAuB,OAAO,sBAAsB,iBAAiB,EAAE,SAAS,CAAcA,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,UAAU,CAAC,EAAE,mIAAmI,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,6CAA6C,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,UAAU,CAAC,EAAE,qGAAgG,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,eAAe,CAAC,EAAE,sLAAsL,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,0BAA0B,WAAW,uBAAuB,OAAO,sBAAsB,iBAAiB,EAAE,SAAS,CAAcA,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,UAAU,CAAC,EAAE,0HAA0H,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4CAA4C,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,UAAU,CAAC,EAAE,wFAAwF,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,eAAe,CAAC,EAAE,8JAA8J,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,0BAA0B,WAAW,uBAAuB,OAAO,sBAAsB,iBAAiB,EAAE,SAAS,CAAcA,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,UAAU,CAAC,EAAE,kIAAkI,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,wBAAwB,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,UAAU,CAAC,EAAE,sEAAsE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,eAAe,CAAC,EAAE,yJAAoJ,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,0BAA0B,WAAW,uBAAuB,OAAO,sBAAsB,iBAAiB,EAAE,SAAS,CAAcA,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,UAAU,CAAC,EAAE,8IAAoI,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gBAAgB,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,UAAU,CAAC,EAAE,qGAAqG,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,eAAe,CAAC,EAAE,+KAA+K,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,0BAA0B,WAAW,uBAAuB,OAAO,sBAAsB,iBAAiB,EAAE,SAAS,CAAcA,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,UAAU,CAAC,EAAE,qLAAqL,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,6DAA6D,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,UAAU,CAAC,EAAE,oFAAoF,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,eAAe,CAAC,EAAE,yJAAoJ,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,0BAA0B,WAAW,uBAAuB,OAAO,sBAAsB,iBAAiB,EAAE,SAAS,CAAcA,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,UAAU,CAAC,EAAE,6GAA6G,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gBAAgB,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,UAAU,CAAC,EAAE,uHAAuH,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,eAAe,CAAC,EAAE,wJAAmJ,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,0BAA0B,WAAW,uBAAuB,OAAO,sBAAsB,iBAAiB,EAAE,SAAS,CAAcA,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,UAAU,CAAC,EAAE,mIAAmI,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4BAA4B,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,UAAU,CAAC,EAAE,8GAA8G,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,eAAe,CAAC,EAAE,wKAAwK,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,0BAA0B,WAAW,uBAAuB,OAAO,sBAAsB,iBAAiB,EAAE,SAAS,CAAcA,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,UAAU,CAAC,EAAE,2KAA2K,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kBAAkB,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,UAAU,CAAC,EAAE,4GAA4G,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,eAAe,CAAC,EAAE,+IAA+I,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,0BAA0B,WAAW,uBAAuB,OAAO,sBAAsB,iBAAiB,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,UAAU,CAAC,EAAE,iMAAiM,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeO,EAAuBT,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,8WAA8W,CAAC,EAAeA,EAAE,MAAM,CAAC,IAAI,+BAA+B,UAAU,eAAe,OAAO,MAAM,IAAI,sEAAsE,OAAO,iWAAiW,MAAM,CAAC,YAAY,aAAa,EAAE,MAAM,MAAM,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,OAAO,CAAC,SAAsBA,EAAE,KAAK,CAAC,SAAS,kJAAkJ,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeQ,EAAuBR,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,+iBAA0iB,CAAC,CAAC,CAAC,EAAeS,EAAuBX,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAC,0bAAucE,EAAE,SAAS,CAAC,SAAS,wDAAwD,CAAC,EAAE,sMAAsM,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,uCAAuC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kqBAAkqB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+qBAA0qB,CAAC,CAAC,CAAC,CAAC,EAAeU,EAAuBZ,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAC,6aAAqbE,EAAE,SAAS,CAAC,SAAS,8BAA8B,CAAC,EAAE,oSAAoS,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,wMAAqNE,EAAE,SAAS,CAAC,SAAS,UAAU,CAAC,EAAE,wDAAqEA,EAAE,SAAS,CAAC,SAAS,WAAW,CAAC,EAAE,8FAA2GA,EAAE,SAAS,CAAC,SAAS,QAAQ,CAAC,EAAE,scAAsc,CAAC,CAAC,EAAeA,EAAE,MAAM,CAAC,IAAI,yCAAyC,UAAU,eAAe,OAAO,MAAM,IAAI,uEAAuE,MAAM,CAAC,YAAY,YAAY,EAAE,MAAM,KAAK,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,6BAA6B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0OAA0O,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,WAAW,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8QAA8Q,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mBAAmB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iLAAiL,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kBAAkB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gMAAgM,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mBAAmB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uNAAuN,CAAC,EAAeA,EAAE,MAAM,CAAC,IAAI,yCAAyC,UAAU,eAAe,OAAO,MAAM,IAAI,sEAAsE,MAAM,CAAC,YAAY,aAAa,EAAE,MAAM,KAAK,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+MAA+M,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,qCAAqC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,giBAAgiB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qWAAqW,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yaAAya,CAAC,CAAC,CAAC,CAAC,EAAeW,EAAuBb,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,gaAAga,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8fAA8f,CAAC,CAAC,CAAC,CAAC,EAAeY,EAAwBd,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,wbAAwb,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2eAA2e,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qmBAAqmB,CAAC,CAAC,CAAC,CAAC,EAAea,EAAwBf,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,oUAAoU,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gjBAAgjB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gdAAgd,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uYAAuY,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4vBAA4vB,CAAC,CAAC,CAAC,CAAC,EAAec,EAAwBhB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,8dAA+d,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+nBAA4nB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8ZAAyZ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wWAA0W,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+OAA+O,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,ucAAwc,CAAC,CAAC,CAAC,CAAC,EAAee,EAAwBjB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,mbAAmb,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yoBAAyoB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6eAA6e,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kcAAkc,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,scAAwc,CAAC,CAAC,CAAC,CAAC,EAAegB,EAAwBlB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,ycAAyc,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,ugBAAygB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,seAAse,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,+PAA4QE,EAAEC,EAAE,CAAC,KAAK,uBAAuB,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,mBAAmB,CAAC,CAAC,CAAC,EAAE,8LAA8L,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,0rBAA0rB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wPAAwP,CAAC,CAAC,CAAC,CAAC,EAAeiB,EAAwBnB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,4YAA4Y,CAAC,EAAeA,EAAE,MAAM,CAAC,UAAU,qBAAqB,MAAM,CAAC,OAAO,OAAO,MAAM,MAAM,EAAE,SAAsBA,EAAEkB,EAAE,CAAC,oBAAoB,wEAAwE,SAASC,GAAgBnB,EAAEoB,EAAE,CAAC,GAAGD,EAAE,KAAK;AAAA;AAAA;AAAA;AAAA;AAAA,sRAA8rC,SAAS,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeE,EAAwBrB,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,gdAA2c,CAAC,CAAC,CAAC,EAAesB,EAAwBxB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,sEAAsE,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,2BAA2B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sNAAsN,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0BAA0B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wQAAwQ,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,uCAAuC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8IAA8I,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,kMAAkM,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,iGAAiG,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uGAAuG,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,wCAAwC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qHAAqH,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,4GAA4G,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,kGAAkG,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,oHAAoH,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oJAAoJ,CAAC,CAAC,CAAC,CAAC,EAAeuB,EAAwBzB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,6ZAA6Z,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8PAA8P,CAAC,CAAC,CAAC,CAAC,EAAewB,EAAwB1B,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,8ZAA8Z,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oXAAoX,CAAC,CAAC,CAAC,CAAC,EAAeyB,EAAwB3B,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,oRAAoR,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iBAAiB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,wEAAqFE,EAAEC,EAAE,CAAC,KAAK,sGAAsG,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,UAAU,CAAC,CAAC,CAAC,EAAE,+YAAqY,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,eAAe,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,gPAAmPE,EAAEC,EAAE,CAAC,KAAK,uHAAuH,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,UAAU,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oBAAoB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAEC,EAAE,CAAC,KAAK,0MAA0M,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,SAAS,CAAC,CAAC,CAAC,EAAE,2WAAiW,CAAC,CAAC,EAAeF,EAAE,MAAM,CAAC,IAAI,sCAAsC,UAAU,eAAe,OAAO,MAAM,IAAI,uEAAuE,MAAM,CAAC,YAAY,aAAa,EAAE,MAAM,KAAK,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,KAAkBE,EAAEC,EAAE,CAAC,KAAK,wHAAwH,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,OAAO,CAAC,CAAC,CAAC,EAAE,uOAAuO,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,wBAAwB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,eAA4BE,EAAEC,EAAE,CAAC,KAAK,uDAAuD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,oBAAoB,CAAC,CAAC,CAAC,EAAE,iLAAiL,CAAC,CAAC,EAAeF,EAAE,MAAM,CAAC,IAAI,sCAAsC,UAAU,eAAe,OAAO,MAAM,IAAI,uEAAuE,MAAM,CAAC,YAAY,YAAY,EAAE,MAAM,KAAK,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sWAAsW,CAAC,CAAC,CAAC,CAAC,EAAe0B,EAAwB1B,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,8kBAA8kB,CAAC,CAAC,CAAC,EACppwD2B,EAAqB,CAAC,QAAU,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,SAAW,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,mBAAqB,CAAC,KAAO,UAAU,CAAC,CAAC",
  "names": ["richText", "u", "x", "p", "Link", "motion", "richText1", "richText2", "richText3", "richText4", "richText5", "richText6", "richText7", "richText8", "richText9", "richText10", "richText11", "richText12", "richText13", "richText14", "richText15", "ComponentPresetsConsumer", "t", "CodeBlock_default", "richText16", "richText17", "richText18", "richText19", "richText20", "richText21", "__FramerMetadata__"]
}
