Summary
When setting model permissions so that a group has read access to it, intending for other users to use it, those users also can read the model's system prompt.
However users may consider their system prompt confidential, so we consider this a security issue.
Compare https://genai.owasp.org/llmrisk/llm072025-system-prompt-leakage/ or prompt injections to get popular chatbots on the internet to reveal their prompt.
Details
We discovered that users can open the workspace model edit page /workspace/models/edit?id=notmymodel for models that do not appear in their workspace.
Saving is not possible, that permission check is correct.
On the API level:
/api/v1/models/model?id=notmymodel -> returns the model details, most importantly params.system
- even though
/api/v1/models/list does NOT contain the model since it checks for write permission.
/api/models contains the model correctly and does not reveal the system prompt.
It seems inconsistent that the REST API list does not contain an item, but if you know the id, you can access it anyway.
PoC
- create model
- give read permission to group with another user
- other user can access
/api/v1/models/model?id=notmymodel
Impact
System prommpt leakage
If this is intended behavior for the "read" permission, maybe there should be an additional "use" permission (which would be 99% of use cases of the read permission i believe).
References
Summary
When setting model permissions so that a group has read access to it, intending for other users to use it, those users also can read the model's system prompt.
However users may consider their system prompt confidential, so we consider this a security issue.
Compare https://genai.owasp.org/llmrisk/llm072025-system-prompt-leakage/ or prompt injections to get popular chatbots on the internet to reveal their prompt.
Details
We discovered that users can open the workspace model edit page /workspace/models/edit?id=notmymodel for models that do not appear in their workspace.
Saving is not possible, that permission check is correct.
On the API level:
/api/v1/models/model?id=notmymodel-> returns the model details, most importantly params.system/api/v1/models/listdoes NOT contain the model since it checks for write permission./api/modelscontains the model correctly and does not reveal the system prompt.It seems inconsistent that the REST API list does not contain an item, but if you know the id, you can access it anyway.
PoC
/api/v1/models/model?id=notmymodelImpact
System prommpt leakage
If this is intended behavior for the "read" permission, maybe there should be an additional "use" permission (which would be 99% of use cases of the read permission i believe).
References