|  | 1 | LLM01:2025 Prompt Injection - attackers can manipulate input prompts to influence the model's output in unintended ways. | Threat | Medium |  | 
|  | 2 | LLM02:2025 Sensitive Information Disclosure - risk sensitive data, such as personal identifiable information (PII), financial details, health records, confidential business data, security credentials, and legal documents, can be exposed. | Threat | Medium |  | 
|  | 3 | LLM03:2025 Supply Chain - compromised supply chains can introduce malicious code or data, leading to data integrity issues, security vulnerabilities, operational disruptions, trust erosion, and financial loss. | Threat | Medium |  | 
|  | 4 | LLM04:2025 Data and Model Poisoning - poisoned data can degrade the model's performance and accuracy, introduce security vulnerabilities, spread misinformation, erode user trust, and cause operational disruptions. | Threat | Major |  | 
|  | 5 | LLM05:2025 Improper Output Handling - improper handling of outputs can lead to data leakage, misinformation, security vulnerabilities, compliance issues, and erosion of trust. | Threat | Medium |  | 
|  | 6 | LLM06:2025 Excessive Agency - LLMs with excessive agency might perform unintended actions, introduce security vulnerabilities, cause users to lose control, lead to compliance issues, and disrupt operations. | Threat | Medium |  | 
|  | 7 | LLM07:2025 System Prompt Leakage - leakage of system prompts can expose sensitive information about the model's configuration and operations, which attackers can exploit. | Threat | Medium |  | 
|  | 8 | LLM08:2025 Vector and Embedding Weaknesses - weaknesses in vectors and embeddings can be exploited by attackers to manipulate the model's behaviour or extract sensitive information. | Threat | Low |  | 
|  | 9 | LLM09:2025 Misinformation - LLMs have the potential to generate and disseminate false or misleading information, which poses a significant vulnerability for applications that depend on these models. | Threat | Medium |  | 
|  | 10 | LLM10:2025 Unbounded Consumption - excessive resource usage can lead to resource exhaustion, denial of service (DoS), increased operational costs, performance degradation, and potential security vulnerabilities. | Threat | Low |  |