Exploiting Instruction-Following Retrievers for Malicious Information Retrieval

Open in new window