Skip to main content

OWASP Top 10 LLM Risks

OWASP Top 10 LLM Risks

Understanding the critical security vulnerabilities in Large Language Model (LLM) applications.

#1

Prompt Injection

Tricking the LLM through malicious input to ignore its original instructions or perform unauthorized actions. This can lead to unexpected and harmful behavior.

#2

Sensitive Information Disclosure

The LLM inadvertently reveals confidential data (PII, secrets, internal context) from its training data, context window, or external data retrieval systems.

#3

Supply Chain Risks

Compromise through vulnerabilities in pre-trained models, third-party plugins, or data sources used to build, train, or integrate the LLM application.

#4

Data and Model Poisoning

Malicious actors inject corrupted or biased data during the training/fine-tuning process, leading the model to learn harmful, incorrect, or prejudiced behaviors.

#5

Improper Output Handling

The LLM generates potentially harmful or executable content (e.g., HTML, SQL, code snippets) that is not sanitized before being rendered or executed by the host system.

#6

Excessive Agency

The LLM is given overly permissive functions or access rights, allowing it to perform critical, unintended, or dangerous actions (e.g., deleting data, transferring funds).

#7

System Prompt Leakage

An attacker successfully extracts the secret, proprietary system prompt or configuration details, revealing the LLM's operational logic and potentially sensitive context.

#8

Vector and Embedding Weaknesses

Vulnerabilities in Vector Databases or Retrieval-Augmented Generation (RAG) systems, such as injecting vectors that lead to incorrect or malicious data retrieval.

#9

Misinformation

The LLM generates false, inaccurate, or misleading information (hallucinations), which is then consumed and trusted by the end-user or downstream systems.

#10

Unbounded Consumption

Lack of effective resource limits leads to denial-of-service (DoS) or excessive billing by allowing attackers to trigger high-cost, continuous, or repeated computational tasks.

Source: OWASP Foundation - Top 10 for Large Language Model Applications

Comments

Popular posts from this blog

How AI-powered social engineering exploits help desk staff and what tech companies can do to stay ahead

Photographer: Centre for Ageing Better | Source: Unsplash In today’s digital world, technology advances swiftly, bringing both opportunities and challenges. Businesses and individuals alike rely on tech for solutions and support. However, cybercriminals have adapted, using artificial intelligence (AI) to conduct sophisticated social engineering attacks targeting help desk staff. Understanding these threats and implementing effective countermeasures is crucial for companies aiming to bolster their cybersecurity. Understanding AI-powered social engineering AI-powered social engineering involves using AI tools to mimic human-like interactions, exploiting the natural trust help desk staff have in their clients. These attacks can be compelling, as AI can generate language patterns and adapt quickly to responses, making it difficult for employees to distinguish between legitimate queries and those of malicious actors. AI's ability to learn and adapt in real-time makes these attacks part...

The AI Revolution: Who's Leading the Charge in 2025

Photographer: Igor Omilaev | Source: Unsplash Hey there, tech enthusiasts! As someone who's been tracking the AI landscape closely, I wanted to share some exciting developments happening in the world of artificial intelligence this year. 2025 has already seen some game-changing partnerships and product launches that are reshaping our perspective on technology. Let's break it down in simple terms! The Big Tech Players: What They're Up To Google's Bold Moves Google isn't holding back! They've rolled out Gemini 2.5 Pro and Gemini 2.5 Flash, which are now top performers in learning and coding benchmarks. What I find most exciting is Gemini Live, which lets you interact with AI in real-world situations through multiple formats (text, images, voice). They've also launched an AI-powered TV and enhanced their search with a new AI Mode. Remember Project Starline? It has evolved into Google Beam, offering incredibly realistic 3D video calls. Nvidia: Powering th...

Understanding Digital Literacy: Essential Skills for Navigating Today's Technology-Driven World

Photographer: Firmbee.com | Source: Unsplash Why Digital Literacy Matters (And How It Can Change Your Life) Hey there, tech enthusiasts! 👋 Ever wonder what people mean when they throw around the term "digital literacy"? It's not just about knowing how to use your smartphone or post the perfect selfie (though those skills definitely count!). Digital literacy is about confidently navigating our tech-filled world—finding information, figuring out what's legit, creating cool content, and connecting with others online. It's basically your superpower in the digital age! What's Actually In The Digital Literacy Toolkit? Being digitally literate isn't just a one-trick pony. It's more like having a Swiss Army knife of skills: Information Detective Skills: Can you Google like a pro and figure out which sources are actually trustworthy? That's information literacy at work! - Digital Social Skills: From Slack to Zoom to that group chat that never stop...