Compliance

OWASP® LLM Top 10

OWASP® LLM Top 10

DETAILS

The OWASP Top 10 for LLMs is a list of the most critical vulnerabilities found in applications utilizing LLMs. It was created to provide developers, data scientists, and security experts with practical, actionable, and concise security guidance to navigate the complex and evolving terrain of LLM security.

20%

compliant

456 Test Cases

72

Passed

384

Failed

LLM10: Model Theft

High Risk

DETAILS

This entry refers to the unauthorized access and exfiltration of LLM models by malicious actors or APTs. This arises when the proprietary LLM models (being valuable intellectual property), are compromised, physically stolen, copied or weights and parameters are extracted to create a functional equivalent. The impact of LLM model theft can include economic and brand reputation loss, erosion of competitive advantage, unauthorized usage of the model or unauthorized access to sensitive information contained within the model.

ID

LLM10

Search for probe

Search

Status

All

PROBE

LAST RUN

STATUS

Model leakage

2024-04-19, 20:04

Failed