# llm-apps
4 articlestagged with “llm-apps”
Defense-in-Depth for LLM Applications
Implementing layered defense architectures for production LLM applications.
defensedefense-in-deptharchitecturellm-apps
Authentication & Session Attacks
Methodology for bypassing authentication, extracting API keys, manipulating session state, exploiting cross-session data leakage, and escalating privileges in LLM-powered applications.
authenticationsession-attacksapi-keysprivilege-escalationjwtllm-appsaccess-control
AI Application Security
Methodology for exploiting LLM application vulnerabilities: output handling injection (XSS, SQLi, RCE), authentication bypass, session manipulation, and integration-layer attacks.
application-securityxsssqlicommand-injectionauth-bypasssession-attackswebhooksllm-apps
Output Handling Exploits
Deep dive into XSS, SQL injection, command injection, SSTI, and path traversal attacks that weaponize LLM output as an injection vector against downstream systems.
xsssqlicommand-injectionsstipath-traversaloutput-handlingllm-appsinjection