diff --git a/changes.md b/changes.md index 860c05ca..47127df0 100644 --- a/changes.md +++ b/changes.md @@ -6,8 +6,24 @@ The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.0.0/), ## [1.0.1] - 2023-08-26 +[v1.1 Instructions for the Expert Group reference](https://github.com/OWASP/www-project-top-10-for-large-language-model-applications/wiki/v1_1-phases#v11-instructions-for-the-expert-group) + ### Fixed -- Spelling, grammer, formatting clean ups +- Spelling, grammer, formatting clean ups via an agreed [IDE code linter](https://marketplace.visualstudio.com/items?itemName=streetsidesoftware.code-spell-checker) for Vulnerability Entry Leads to prevent future errors and standard conformity throughout the repo. +- Enhancements, updates and recommendations to each vulnerability entry via community-raised [GitHub issues](https://github.com/OWASP/www-project-top-10-for-large-language-model-applications/issues?q=is%3Aissue+is%3Aopen+) within the repo which were then triaged to the corresponding [vulnerability entry lead](https://github.com/OWASP/www-project-top-10-for-large-language-model-applications/wiki/Core-Team#core-team-members-as-of-august-27th-2023) for triage and resolution through Pull Requests to the repo `v1.1` [directory](https://github.com/OWASP/www-project-top-10-for-large-language-model-applications/tree/main/1_1_vulns). + +### Added +- Architected a `CODEOWNERS` [file](https://github.com/OWASP/www-project-top-10-for-large-language-model-applications/blob/main/CODEOWNERS) and branch protection rules in aid to audit and control CI/CD workflow and updates of the repo against the default branch. +- Redesign of the repo [style and layout](https://github.com/GangGreenTemperTatum/www-project-top-10-for-large-language-model-applications/tree/main/documentation/style) guidelines for vulnerability entries +- Inclusion of [artifacts](https://github.com/GangGreenTemperTatum/www-project-top-10-for-large-language-model-applications/tree/main/1_1_vulns/artifacts) (visual diagrams) which maps the Top 10 entries against a typical LLM application and client/server interaction + +### Other Additions +- We added an automated meeting for our biweekly schedule here: + - 👉 Download the official `.ical` [here](https://calendar.google.com/calendar/ical/c_9eae74fd13614c3e7fe4a7189c28f40daa1c1916b9e385352aaf8b940a0094a9%40group.calendar.google.com/private-0ddc3b9c19bf2a24a92a2aef3ea4c6b7/basic.ics) to import into your calendar application. +- We also introduced an [OWASP Top 10 for Large Language Model Applications Newsletter](https://llmtop10.beehiiv.com/subscribe) for signup of notifications about the project. + - 👀 The November 2023 newsletter will include a call for opportunity to participate in an open-source project with [Ads](https://github.com/GangGreenTemperTatum) to create a DV-LLMA (Damn Vulnerable LLM Application) to test and hone your skills as well as a fun learning and development experience for LLM application vulnerabilities. +- The OWASP LLM Top 10 continues to translate the list into different languages! This is done by multilingual members (humans) + - If you're fluent in another language and willing to help, email us at: `translations@llmtop10.com` ## [1.0] - 2023-08-01