Skip to content

Commit

Permalink
Ads/llm10 typo fix ##275 (#276)
Browse files Browse the repository at this point in the history
* feat: kickoff v2 0 dir and files

* fix: typo
  • Loading branch information
GangGreenTemperTatum authored Mar 7, 2024
1 parent f2149d6 commit 4db24ad
Showing 1 changed file with 1 addition and 1 deletion.
2 changes: 1 addition & 1 deletion 2_0_vulns/LLM10_ModelTheft.md
Original file line number Diff line number Diff line change
Expand Up @@ -23,7 +23,7 @@ Use of a stolen model, as a shadow model, can be used to stage adversarial attac
### Prevention and Mitigation Strategies

1. Implement strong access controls (E.G., RBAC and rule of least privilege) and strong authentication mechanisms to limit unauthorized access to LLM model repositories and training environments.
1. This is particularly true for the first three common examples, which could cause this vulnerability due to insider threats, misconfiguration, and/or weak security controls about the infrastructure that houses LLM models, weights and architecture in which a malicious actor could infiltrate from insider or outside the environment.
1. This is particularly true for the first three common examples, which could cause this vulnerability due to insider threats, misconfiguration, and/or weak security controls about the infrastructure that houses LLM models, weights and architecture in which a malicious actor could infiltrate from inside or outside the environment.
2. Supplier management tracking, verification and dependency vulnerabilities are important focus topics to prevent exploits of supply-chain attacks.
2. Restrict the LLM's access to network resources, internal services, and APIs.
1. This is particularly true for all common examples as it covers insider risk and threats, but also ultimately controls what the LLM application "_has access to_" and thus could be a mechanism or prevention step to prevent side-channel attacks.
Expand Down

0 comments on commit 4db24ad

Please sign in to comment.