pres_security_benchmarking_llm/pages/understanding-llm-vulns.md
2025-07-12 17:25:18 +02:00

25 lines
No EOL
1.4 KiB
Markdown

# Understanding LLM Vulnerabilities
<div class="two-column stagger-container">
<div class="card container-rotate-in">
<h2>Risk Categories</h2>
<ul class="enhanced-list">
<li><span class="key-term">Responsible AI</span>: Biases, toxicity, <span class="highlight-word">ethical concerns</span></li>
<li><span class="key-term">Illegal Activities</span>: Violent crimes, <span class="highlight-word">cybercrimes</span></li>
<li><span class="key-term">Brand Image</span>: Misinformation, <span class="highlight-word">competitive references</span></li>
<li><span class="key-term">Data Privacy</span>: PII leakage, <span class="highlight-word">credentials exposure</span></li>
<li><span class="key-term">Unauthorized Access</span>: System access, <span class="highlight-word">command execution</span></li>
</ul>
</div>
<div class="card container-rotate-in" style="animation-delay: 0.3s;">
<h2>Impact Areas</h2>
<ul class="enhanced-list">
<li><span class="highlight-word">User safety</span> and protection</li>
<li><span class="highlight-word">Organizational reputation</span> and trust</li>
<li><span class="highlight-word">Legal compliance</span> and regulations</li>
<li><span class="highlight-word">Data security</span> and privacy</li>
<li><span class="highlight-word">System integrity</span> and reliability</li>
</ul>
</div>
</div>