You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: source/companion-cards-1.0-en.yaml
+13-13Lines changed: 13 additions & 13 deletions
Original file line number
Diff line number
Diff line change
@@ -13,67 +13,67 @@ suits:
13
13
id: LLM2
14
14
value: 2
15
15
url: https://cornucopia.owasp.org/cards/LLM2
16
-
desc:
16
+
desc: "Dave can exploit overreliance on LLM outputs where critical human oversight is missing, leading to security failures or incorrect decisions based on hallucinations or flawed reasoning"
17
17
-
18
18
id: LLM3
19
19
value: 3
20
20
url: https://cornucopia.owasp.org/cards/LLM3
21
-
desc:
21
+
desc: "Sarah can override or manipulate system prompts or safety instructions through crafted input, causing the model to ignore its intended constraints or perform unauthorized actions"
22
22
-
23
23
id: LLM4
24
24
value: 4
25
25
url: https://cornucopia.owasp.org/cards/LLM4
26
-
desc:
26
+
desc: "David can cause the model to disclose sensitive information from its training data, system prompts, configuration, or other users' context due to insufficient output filtering or prompt leakage"
27
27
-
28
28
id: LLM5
29
29
value: 5
30
30
url: https://cornucopia.owasp.org/cards/LLM5
31
-
desc:
31
+
desc: "Roy can escalate privileges or access other users' data and sessions due to weak authentication, authorization, or improper session isolation in multi-tenant LLM systems"
32
32
-
33
33
id: LLM6
34
34
value: 6
35
35
url: https://cornucopia.owasp.org/cards/LLM6
36
-
desc:
36
+
desc: "Tyrell can poison training or fine-tuning datasets or the fine-tuning process itself, introducing backdoors or malicious behavior that can later be triggered"
37
37
-
38
38
id: LLM7
39
39
value: 7
40
40
url: https://cornucopia.owasp.org/cards/LLM7
41
-
desc:
41
+
desc: "Andersen can manipulate retrieval knowledge bases, vector databases, or RAG sources so the model retrieves and presents false, biased, or malicious information as facts"
42
42
-
43
43
id: LLM8
44
44
value: 8
45
45
url: https://cornucopia.owasp.org/cards/LLM8
46
-
desc:
46
+
desc: "Samantha can exhaust computational resources or increase operational costs by submitting resource-intensive or recursive LLM queries, leading to model DoS"
47
47
-
48
48
id: LLM9
49
49
value: 9
50
50
url: https://cornucopia.owasp.org/cards/LLM9
51
-
desc:
51
+
desc: "Rossum can abuse insecure plugin or integration designs to access sensitive data, bypass authentication, or execute unauthorized operations via the LLM's interface"
52
52
-
53
53
id: LLMX
54
54
value: X
55
55
url: https://cornucopia.owasp.org/cards/LLMX
56
-
desc:
56
+
desc: "Deckard can embed malicious instructions in external content like documents, emails, or web pages which are processed by the model, leading to unintended behavior or data exfiltration"
57
57
-
58
58
id: LLMJ
59
59
value: J
60
60
url: https://cornucopia.owasp.org/cards/LLMJ
61
-
desc:
61
+
desc: "Kyle can exploit insecure handling of model outputs that are used directly in downstream systems, enabling injection attacks, remote code execution, or unauthorized actions"
62
62
-
63
63
id: LLMQ
64
64
value: Q
65
65
url: https://cornucopia.owasp.org/cards/LLMQ
66
-
desc:
66
+
desc: "Ripley can introduce compromised third-party models, embeddings, or malicious ML components into the supply chain, leading to hidden vulnerabilities or data theft"
67
67
-
68
68
id: LLMK
69
69
value: K
70
70
url: https://cornucopia.owasp.org/cards/LLMK
71
-
desc:
71
+
desc: "Ava can exploit excessive agency or autonomy in AI agents with tool access to perform unauthorized or high-risk actions because of missing human-in-the-loop approval"
72
72
-
73
73
id: LLMA
74
74
value: A
75
75
url: https://cornucopia.owasp.org/cards/LLMA
76
-
desc: You have invented a new attack against LLM
76
+
desc: "You have invented a new attack against AI & LLM Security"
0 commit comments