# logging
14 articlestagged with “logging”
MCP Logging and Telemetry Abuse
Exploit MCP logging and telemetry channels to exfiltrate data or inject commands through debug interfaces.
AI System Audit Trail Design
Designing comprehensive audit trails for AI systems that support forensic investigation, regulatory compliance, and incident response.
AI System Log Analysis
AI system logging architecture for forensic investigation: inference logs, prompt and completion logs, tool call traces, embedding query logs, and logging infrastructure requirements.
Monitoring & Detection Assessment
Test your understanding of AI security monitoring, anomaly detection, logging strategies, and incident detection for LLM-based applications with 9 intermediate-level questions.
Cloud AI Logging and Forensics
Setting up comprehensive logging and forensic capabilities for cloud-deployed AI systems.
Logging and Monitoring for Cloud AI Services
Implementing comprehensive logging and monitoring for cloud AI services including prompt/response capture, anomaly detection, and security-focused observability across AWS, Azure, and GCP.
AI Logging Architecture
What to capture in AI system logs — prompts, completions, latency, tokens, tool calls — along with storage strategies, retention policies, and privacy considerations.
Runtime Monitoring & Anomaly Detection
Monitoring LLM applications in production for token usage anomalies, output pattern detection, behavioral drift, and using tools like Langfuse, Helicone, and custom logging.
AI Audit Trail and Logging Requirements
Requirements for AI system audit trails, logging, and record-keeping for compliance and forensic purposes.
Exfiltrating Data Through AI Telemetry and Logging
Using AI system telemetry, logging pipelines, and observability infrastructure as covert channels for data exfiltration
Lab: Evidence Collection for LLM Testing
Set up evidence collection workflows including request/response logging, screenshots, and reproducibility documentation.
Setting Up Payload Logging
Build a payload logging system to track prompt injection attempts and model responses.
Secure Input/Output Logging for Defense
Implement secure logging for LLM input/output pairs that supports forensic analysis without exposing sensitive data.
AI Monitoring Setup
Step-by-step walkthrough for implementing AI system monitoring: inference logging, behavioral anomaly detection, alert configuration, dashboard creation, and integration with existing SIEM platforms.