LLM - OWASP Top 10 (Comprehensive Guide to LLM Security)
Large Language Model (LLM) applications introduce new attack surfaces across prompts, retrieval pipelines (RAG), tools/plugins, and ML supply chains. This section provides a practical, security-first guide to the most common risks and defenses.
What you’ll find here:
- Clear descriptions of each risk, tailored to real LLM architectures
- Detailed examples and proofs you can reproduce safely
- Prioritized remediation and prevention checklists
- Internal links to related topics (SSRF, cloud metadata, mobile supply chain)
SEO keywords: LLM security, OWASP Top 10 for LLMs, prompt injection, RAG security, agent safety, plugin security, model supply chain, data leakage, model DoS.
Use these pages for secure design reviews, red-teaming exercises, and building robust guardrails.