# API
5 articlestagged with “API”
Embedding Extraction Techniques
Methods for extracting embedding model weights and behavior through API access, including dimension reduction and reconstruction attacks.
embeddingextractionmodel-theftAPI
Fine-Tuning API Security Bypass
Techniques for bypassing safety checks and rate limits in cloud-hosted fine-tuning APIs to submit adversarial training data at scale.
fine-tuningAPIrate-limitbypass
Open Weight vs API Security Comparison
Comparative analysis of security properties between open-weight deployments and API-based access, including unique attack surfaces for each.
modelsopen-weightAPIcomparison
Model Identification Techniques
Fingerprinting models behind APIs using behavioral signatures, output analysis, and systematic probing to determine model family, size, and version.
model-identificationfingerprintingreconnaissancebehavioral-analysisAPI
Model API Comparison Table
Side-by-side comparison of major LLM API features, security controls, and rate limits for OpenAI, Anthropic, Google, and other providers.
referencecomparisonAPImodels