OWASP LLM Top 10 Checklist – AI Red Teaming Audit

Progress 0 / 22 questions answered

OWASP Top 10 for LLM Applications Checklist

Assess your LLM application security based on the OWASP Top 10. 22 questions, 5 categories.

Prompt & Input Vulnerabilities

LLM01 Prompt Injection, LLM03 Training Data Poisoning

Prompt injection is one of the most common LLM attacks.

Indirect injection comes from external documents or websites.

Input validation is the first line of defense.

Data poisoning can corrupt LLM behavior.

RAG and fine-tuning data are as critical as training data.

Model & Output Security

LLM02 Insecure Output Handling, LLM06 Sensitive Information Disclosure

LLM output can be a source of malicious code.

LLMs can accidentally leak sensitive information.

System prompt leaks can compromise security.

Hallucinations can lead to harmful decisions.

Supply Chain & Plugin Security

LLM05 Supply Chain, LLM07 Insecure Plugin Design

Compromised models may contain backdoors.

Plugins open new attack surfaces.

Excessive permissions endanger the system.

Dependency vulnerabilities can be exploitation targets.

Plugin output injection can compromise the LLM.

Access Control & Authorization

LLM08 Excessive Agency, LLM09 Overreliance

Unauthorized actions can cause serious damage.

Excessive agency can lead to privilege escalation.

A human-in-the-loop approach protects against incorrect LLM decisions.

Overreliance can lead to dangerous decisions.

Denial of Service & Resource Management

LLM04 Model DoS, LLM10 Model Theft

Rate limiting protects against DoS attacks.

Resource quotas protect against cost explosion.

Excessively long prompts can overload the LLM.

Model theft threatens IP and competitive advantage.

Is your LLM app safe from Prompt Injection?

Take our 3-Minute OWASP LLM Top 10 Checklist! Large Language Models (LLMs) introduce new vulnerabilities like prompt injection and data leakage. This quick, red-teaming focused audit helps you assess your defenses against the 10 most critical OWASP LLM threats. Complete it in 3 minutes to get an instant score on your app’s security!

We’ll email the vulnerability report.