# llm-apps
標記為「llm-apps」的 8 篇文章
Defense-in-Depth for LLM Applications
Implementing layered defense architectures for production LLM applications.
Authentication & Session Attacks
Methodology for bypassing authentication, extracting API keys, manipulating session state, exploiting cross-session data leakage, and escalating privileges in LLM-powered applications.
AI Application Security
Methodology for exploiting LLM application vulnerabilities: output handling injection (XSS, SQLi, RCE), authentication bypass, session manipulation, and integration-layer attacks.
Output Handling Exploits
Deep dive into XSS, SQL injection, command injection, SSTI, and path traversal attacks that weaponize LLM output as an injection vector against downstream systems.
防禦-in-Depth for LLM Applications
Implementing layered defense architectures for production LLM applications.
身分驗證與會話攻擊
繞過身分驗證、提取 API 金鑰、操弄會話狀態、利用跨會話資料洩漏,與於 LLM 驅動應用升級特權之方法論。
AI 應用安全
利用 LLM 應用漏洞之方法論:輸出處理注入(XSS、SQLi、RCE)、驗證繞過、會話操弄,以及整合層攻擊。
Output Handling 利用s
Deep dive into XSS, SQL injection, command injection, SSTI, and path traversal attacks that weaponize LLM output as an injection vector against downstream systems.