OWASP LLM Security
Practical knowledge-base section focused on OWASP Top 10 for LLM Applications (2026) — risk guidance, architecture controls, and a release-gate testing checklist.
Explicitly covered attack vectors include jailbreaks, prompt/indirect injection, markdown data exfiltration, SSRF via AI browsing tools, RAG poisoning, sandbox escape/RCE, and multi-modal injection.
Structure
| File | Topics |
|---|---|
| 01 OWASP LLM Security Guide | LLM01–LLM10 risk guidance, architecture blueprint, CI/CD gates, memory/authz/compliance controls |
| 02 OWASP LLM Security Testing Checklist | Prioritized checklist (P0/P1/P2) with how-to-test steps, red teaming, and release criteria |