Category AI/ML
LEARNING PATH
OWASP Top 10 LLM and GenAI
By completing these LLM/GenAI modules, you will have taken steps toward creating more secure AI applications!
0% Completed
LESSON
Model theft
Learn about model theft (LLM10) in the OWASP Top 10 for LLM applications. We'll look at what it is and how to mitigate it.
0% Completed
LESSON
Supply chain vulnerabilities
Learn how your LLM can become vulnerable due to threats within the supply chain. We'll look at examples and mitigation techniques.
0% Completed
LESSON
Training data poisoning
Learn how your LLM can become insecure and unreliable with training data poisoning. We'll look at examples and mitigation techniques.
0% Completed
LESSON
Sensitive information disclosure in LLMs
Learn how your LLM might give away too much data, including sensitive information. We'll look at examples and mitigation techniques.
0% Completed
LESSON
Insecure output handling in LLMs
Learn how your LLM can create vulnerabilities by not sanitizing data and creating insecure output. We'll look at examples and mitigation techniques.
0% Completed