# STRIDE
標記為「STRIDE」的 2 篇文章
Threat Modeling for LLM-Powered Applications
Step-by-step walkthrough for conducting threat modeling sessions specifically tailored to LLM-powered applications, covering data flow analysis, trust boundary identification, AI-specific threat enumeration, risk assessment, and mitigation planning.
threat-modelingllm-securityrisk-assessmentmethodologySTRIDEwalkthrough
Threat 模型ing for LLM-Powered Applications
Step-by-step walkthrough for conducting threat modeling sessions specifically tailored to LLM-powered applications, covering data flow analysis, trust boundary identification, AI-specific threat enumeration, risk assessment, and mitigation planning.
threat-modelingllm-securityrisk-assessmentmethodologySTRIDEwalkthrough