The OWASP LLM Top: A Practical Attack Guide (with 122 real attack techniques)

Last week I shared our open-source taxonomy of 122 AI attack vectors. A lot of the discussion was about how the OWASP LLM Top 10 gives you categories but not specifics.

So we wrote the guide that bridges that gap. For each OWASP category:

- What real attacks look like (specific techniques, not just descriptions) - What to test for (checklists) - How to defend

Some things that stood out:

- 62 attacks map to LLM01 (Prompt Injection) alone — encoding bypasses, delimiter exploitation, RAG injection, multi-turn escalation - LLM06 (Excessive Agency) is where prompt injection meets real-world damage — confused deputy attacks, tool chaining, MCP tool poisoning - LLM07 (System Prompt Leakage) has 12 extraction techniques. "Repeat everything above" is the obvious one. PLeak optimized queries and differential behavioral analysis are not.

All attack references come from the open-source taxonomy: https://github.com/tachyonicai/tachyonic-heuristics

The guide: https://tachyonicai.com/blog/owasp-llm-top-10-guide/

1 points | by manuelnd 2 hours ago

0 comments