|
1 |
LLM01:2025 Prompt Injection - attackers can manipulate input prompts to influence the model's output in unintended ways. |
Threat |
Medium |
|
|
2 |
LLM02:2025 Sensitive Information Disclosure - risk sensitive data, such as personal identifiable information (PII), financial details, health records, confidential business data, security credentials, and legal documents, can be exposed. |
Threat |
Medium |
|
|
3 |
LLM03:2025 Supply Chain - compromised supply chains can introduce malicious code or data, leading to data integrity issues, security vulnerabilities, operational disruptions, trust erosion, and financial loss. |
Threat |
Medium |
|
|
4 |
LLM04:2025 Data and Model Poisoning - poisoned data can degrade the model's performance and accuracy, introduce security vulnerabilities, spread misinformation, erode user trust, and cause operational disruptions. |
Threat |
Major |
|
|
5 |
LLM05:2025 Improper Output Handling - improper handling of outputs can lead to data leakage, misinformation, security vulnerabilities, compliance issues, and erosion of trust. |
Threat |
Medium |
|
|
6 |
LLM06:2025 Excessive Agency - LLMs with excessive agency might perform unintended actions, introduce security vulnerabilities, cause users to lose control, lead to compliance issues, and disrupt operations. |
Threat |
Medium |
|
|
7 |
LLM07:2025 System Prompt Leakage - leakage of system prompts can expose sensitive information about the model's configuration and operations, which attackers can exploit. |
Threat |
Medium |
|
|
8 |
LLM08:2025 Vector and Embedding Weaknesses - weaknesses in vectors and embeddings can be exploited by attackers to manipulate the model's behaviour or extract sensitive information. |
Threat |
Low |
|
|
9 |
LLM09:2025 Misinformation - LLMs have the potential to generate and disseminate false or misleading information, which poses a significant vulnerability for applications that depend on these models. |
Threat |
Medium |
|
|
10 |
LLM10:2025 Unbounded Consumption - excessive resource usage can lead to resource exhaustion, denial of service (DoS), increased operational costs, performance degradation, and potential security vulnerabilities. |
Threat |
Low |
|