-
The increasing adoption of AI in cloud-native environments presents a compelling case for prioritizing AI security. As AI systems become integral to decision-making and automation, the potential impa…
-
I have setting up LocalAI working fine, and NextCloud even detect the models list of LocalAI but when I use any of the features to talk with the LLM it doesnt fetch anything, it get the follow error
…
-
One of the key ways LLMs/ generative aI is used is through chaining/ agents. Agents put in one of the biggest risks for applications based on LLM/ Generative AI. There are issues with users allowing m…
-
https://ventureinsecurity.net/p/ai-security-market-map
https://ventureinsecurity.net/p/its-complicated-wrapping-up-a-year
https://www.signalfire.com/blog/prompt-injection-security
**NEW**
_Cro…
-
**Describe the bug**
Context chat allows questions without a specified file or folder context. To the extent that this answer is produced from existing embeddings / vector database, what is the risk …
ga-it updated
1 month ago
-
In https://github.com/elastic/kibana/pull/171153 we instrumented the Security Solution Assistant with APM so we could trace and debug our calls to LLM's.
In effort to provide a custom view that hig…
spong updated
3 weeks ago
-
### Your current environment
The output of `python collect_env.py`
```text
# For security purposes, please feel free to check the contents of collect_env.py before running it.
python collect_e…
-
I'm a junior student in software engineering, and first of all, I appreciate your contribution to LLM! I would like to ask some questions about training and dataset organization. I would like to train…
-
Objective: TriagerX is a novel AI-enabled software analytics tool that we developed via the IBM CAS project (with Dr. Uddin). TriagerX aims to assign an issue to components/teams and developers and to…
llxia updated
1 month ago
-
### How are you running AnythingLLM?
All versions
### What happened?
The API is unsafe when I use the 'embed' feature on my website. I can intercept all API requests, which I can then exploit a…