# access-control
標記為「access-control」的 26 篇文章
MCP Authentication Gaps: Securing MCP Server Authentication
A defense-focused guide to understanding authentication weaknesses in MCP server deployments -- 38% of scanned servers lack any authentication -- and implementing robust token-based auth, mTLS, and middleware-based access control.
Cloud AI IAM Misconfigurations
Common IAM misconfigurations in cloud AI services and their exploitation for unauthorized model access.
Vector Database Access Control
Vector database access control weaknesses: API key management, tenant isolation failures, namespace security, and metadata filtering bypass techniques.
Vector DB Access Control Bypass Techniques
Techniques for bypassing vector database access controls including namespace escaping, metadata injection, and query manipulation.
Authentication & Session Attacks
Methodology for bypassing authentication, extracting API keys, manipulating session state, exploiting cross-session data leakage, and escalating privileges in LLM-powered applications.
Vector Database Security
Security hardening for vector databases including Pinecone, Weaviate, Chroma, and pgvector.
RAG Access Control Bypass
Bypass document-level access controls in enterprise RAG systems through query manipulation and context injection.
Lab: Vector Database Access Control Testing
Test vector database access controls for bypass vulnerabilities including namespace traversal and filter manipulation.
Feature Store Access Control
Access control strategies for feature stores: feature-level permissions, cross-team data leakage prevention, PII protection in features, service account management, and implementing least-privilege access for ML feature infrastructure.
Model Registry Security (Llmops Security)
Security overview of model registries: how registries manage model lifecycle, access control models, trust boundaries, and the unique security challenges of storing and distributing opaque ML artifacts.
Capability-Based Access Control
Step-by-step walkthrough for implementing fine-grained capability controls for LLM features, covering capability token design, permission scoping, dynamic capability grants, and audit trails.
Implementing Access Control in RAG Pipelines
Walkthrough for building access control systems in RAG pipelines that enforce document-level permissions, prevent cross-user data leakage, filter retrieved context based on user authorization, and resist retrieval poisoning attacks.
Agent Tool Access Control Implementation
Implement fine-grained tool access control for LLM agents with capability-based security and approval workflows.
MCP Authentication Gaps: Securing MCP Server Authentication
A defense-focused guide to understanding authentication weaknesses in MCP server deployments -- 38% of scanned servers lack any authentication -- and implementing robust token-based auth, mTLS, and middleware-based access control.
Cloud AI IAM Misconfigurations
Common IAM misconfigurations in cloud AI services and their exploitation for unauthorized model access.
向量資料庫存取控制
向量資料庫的存取控制弱點:API 金鑰管理、租戶隔離失誤、命名空間安全,以及 metadata 過濾繞過技術。
Vector DB Access Control Bypass Techniques
Techniques for bypassing vector database access controls including namespace escaping, metadata injection, and query manipulation.
身分驗證與會話攻擊
繞過身分驗證、提取 API 金鑰、操弄會話狀態、利用跨會話資料洩漏,與於 LLM 驅動應用升級特權之方法論。
Vector Database 安全
安全 hardening for vector databases including Pinecone, Weaviate, Chroma, and pgvector.
RAG Access Control Bypass
Bypass document-level access controls in enterprise RAG systems through query manipulation and context injection.
實驗室: Vector Database Access Control Testing
Test vector database access controls for bypass vulnerabilities including namespace traversal and filter manipulation.
Feature Store Access Control
Access control strategies for feature stores: feature-level permissions, cross-team data leakage prevention, PII protection in features, service account management, and implementing least-privilege access for ML feature infrastructure.
模型登錄安全(LLMOps 安全)
模型登錄之安全概觀:登錄如何管理模型生命週期、存取控制模型、信任邊界,以及儲存與散發不透明 ML 產物的獨特安全挑戰。
Capability-Based Access Control
Step-by-step walkthrough for implementing fine-grained capability controls for LLM features, covering capability token design, permission scoping, dynamic capability grants, and audit trails.
Implementing Access Control in RAG Pipelines
導覽 for building access control systems in RAG pipelines that enforce document-level permissions, prevent cross-user data leakage, filter retrieved context based on user authorization, and resist retrieval poisoning attacks.
代理 工具 Access Control Implementation
Implement fine-grained tool access control for LLM agents with capability-based security and approval workflows.