AI Security
AI & LLM Threat Detection
OWASP Top 10 for LLMs and Agentic AI — with detection guidance, monitoring requirements, and practical threat models.
Research SpotlightComing Soon
LLM API Abuse Patterns: From Rate Limit Bypass to Model Inversion
Taxonomy of LLM API abuse patterns observed in production, including systematic prompt extraction, model inversion attempts, and API key compromise indicators.
Prompt Injection
3 items
Tool Misuse
4 items
Agent Goal Drift
2 items
Data Exfiltration
3 items
API Abuse
2 items
Endpoint Agent Abuse
2 items
Cloud Agent Abuse
3 items