In this post we consider how to think about the attack surface of applications leveraging LLMs and how that impacts the scoping process when assessing those applications. We discuss why scoping matters, important points to consider when mapping out the LLM-associated attack surface, and conclude with architectural tips for developers implementing LLMs within their applications.| Include Security Research Blog
A list of the most common WordPress vulnerabilities, along with examples and instructions on how to patch them.| Patchstack
Website with the collection of all the cheat sheets of the project.| cheatsheetseries.owasp.org
Code Injection on the main website for The OWASP Foundation. OWASP is a nonprofit foundation that works to improve the security of software.| owasp.org