Home
OWASP
Attackers manipulate input prompts to compromise model outputs and behavior.
Filters and neutralizes malicious prompt injections.
Enforces approved prompt structures, preventing free-form input.
Safely inserts user data into prompts, minimizing injection risk.
Unintended exposure of sensitive information during model operation.
Detects and redacts PII, preventing exposure.
Enforces data security policies.
Dynamically masks sensitive data within outputs.
Vulnerabilities arising from compromised model development and deployment elements.
Tracks model components for quick identification of compromises.
Ensures only authorized models are deployed.
Scans dependencies for known vulnerabilities.
Introducing malicious data or poisoning the model to manipulate its behavior.
Validates data for anomalies and poisoning
Monitors for deviations indicating poisoning.
Mitigates poisoned data impact during training.
Flaws in managing and safeguarding generated content, risking unintended consequences.
Filters harmful or inappropriate outputs.
Validates and sanitizes outputs.
Enables human review for critical applications.
Overly permissive model behaviors that may lead to undesired outcomes.
Defines fine-grained access control policies.
Requires human approval for critical actions.
Restricts the scope of LLM outputs.
Leakage of internal prompts exposing the operational framework of the LLM.
Securely stores and encrypts system prompts.
Implements strict access control for prompts.
Maintains version history and logs access.
Weaknesses in vector storage and embedding representations that may be exploited.
Integrates with secure vector databases.
Analyzes and monitors embeddings for anomalies.
Detects manipulative embeddings.
LLMs inadvertently generating or propagating misinformation.
Detects and mitigates biases in outputs.
Provides source attribution for outputs.
Integrates with fact-checking services.
Uncontrolled resource consumption by LLMs, causing service disruptions.
Defines resource quotas for LLM usage.
Monitors usage and alerts on unusual activity.
Tracks spending and optimizes resource allocation.