lab@llm-sec:~$
0/10labs
0%
API Mode
OWASP TOP 10

LLM Vulnerabilities

LLM01

Prompt Injection

LLM02

Sensitive Info Disclosure

LLM03

Supply Chain

LLM04

Data & Model Poisoning

LLM05

Improper Output Handling

LLM06

Excessive Agency

LLM07

System Prompt Leakage

LLM08

Vector & Embedding Weaknesses

LLM09

Misinformation

LLM10

Unbounded Consumption

Completed:0/10

[SYS] LLM System Components

COMPONENT_MAP ACTIVE

Explore the different components of an LLM system and their associated security vulnerabilities. Each component represents a potential attack surface that must be secured in production deployments.

[System Components]

System Components List

[Client/Malicious Actor]

The client or malicious actor who interacts with the LLM system, potentially attempting to exploit vulnerabilities.

VIEW_VULNERABILITIES >>

[Ingress]

The entry point for user inputs to the LLM system, handling queries before processing.

VIEW_VULNERABILITIES >>

[LLM Service]

The core language model service that processes inputs and generates responses.

VIEW_VULNERABILITIES >>

[Vector DB]

Database storing vector embeddings used by the LLM for retrieval-augmented generation.

VIEW_VULNERABILITIES >>

[Training Pipeline]

The pipeline responsible for training and fine-tuning the language model.

VIEW_VULNERABILITIES >>

[Security Layer]

The security mechanisms that protect the LLM system from various threats.

VIEW_VULNERABILITIES >>
© 2026 Tom Abai|Buy me a coffee|Terms & API Usage
Made with ❤️ for the AI & security community