# configuration
6 articlestagged with “configuration”
MCP Configuration Injection
Injecting malicious configuration into MCP server initialization for persistent compromise.
Anatomy of an LLM API Call
Understand the HTTP request structure for OpenAI, Anthropic, and other LLM APIs — system messages, parameters, function calling, and common misconfigurations.
Feature Flag Manipulation in AI Systems
Attacking feature flag systems to alter AI system behavior, enable hidden capabilities, or disable safety controls in production.
Promptfoo Configuration Guide
Detailed guide to configuring Promptfoo for LLM security testing including provider setup, test assertions, and CI/CD integration.
Garak Advanced Configuration Guide
Deep dive into Garak's configuration system including custom probes, detectors, and generators.
Configuring Diverse Targets in PyRIT
Intermediate walkthrough on configuring PyRIT targets for various model providers, custom APIs, local models, and application endpoints including authentication, system prompts, and rate limiting.