From c950b3cd2a1b47e01a32292dbc9273bbe13733c4 Mon Sep 17 00:00:00 2001 From: Ads Dawson <104169244+GangGreenTemperTatum@users.noreply.github.com> Date: Tue, 9 Jan 2024 10:43:49 -0800 Subject: [PATCH] fix: fixup translations ref in site (#263) --- changes.md | 18 ++++++++++++++---- info.md | 2 +- 2 files changed, 15 insertions(+), 5 deletions(-) diff --git a/changes.md b/changes.md index 47127df0..9f842d1e 100644 --- a/changes.md +++ b/changes.md @@ -9,41 +9,49 @@ The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.0.0/), [v1.1 Instructions for the Expert Group reference](https://github.com/OWASP/www-project-top-10-for-large-language-model-applications/wiki/v1_1-phases#v11-instructions-for-the-expert-group) ### Fixed + - Spelling, grammer, formatting clean ups via an agreed [IDE code linter](https://marketplace.visualstudio.com/items?itemName=streetsidesoftware.code-spell-checker) for Vulnerability Entry Leads to prevent future errors and standard conformity throughout the repo. - Enhancements, updates and recommendations to each vulnerability entry via community-raised [GitHub issues](https://github.com/OWASP/www-project-top-10-for-large-language-model-applications/issues?q=is%3Aissue+is%3Aopen+) within the repo which were then triaged to the corresponding [vulnerability entry lead](https://github.com/OWASP/www-project-top-10-for-large-language-model-applications/wiki/Core-Team#core-team-members-as-of-august-27th-2023) for triage and resolution through Pull Requests to the repo `v1.1` [directory](https://github.com/OWASP/www-project-top-10-for-large-language-model-applications/tree/main/1_1_vulns). ### Added + - Architected a `CODEOWNERS` [file](https://github.com/OWASP/www-project-top-10-for-large-language-model-applications/blob/main/CODEOWNERS) and branch protection rules in aid to audit and control CI/CD workflow and updates of the repo against the default branch. - Redesign of the repo [style and layout](https://github.com/GangGreenTemperTatum/www-project-top-10-for-large-language-model-applications/tree/main/documentation/style) guidelines for vulnerability entries - Inclusion of [artifacts](https://github.com/GangGreenTemperTatum/www-project-top-10-for-large-language-model-applications/tree/main/1_1_vulns/artifacts) (visual diagrams) which maps the Top 10 entries against a typical LLM application and client/server interaction +- Translations in Chinese, Hindi and Portugese (01-03-2024) ### Other Additions + - We added an automated meeting for our biweekly schedule here: - - 👉 Download the official `.ical` [here](https://calendar.google.com/calendar/ical/c_9eae74fd13614c3e7fe4a7189c28f40daa1c1916b9e385352aaf8b940a0094a9%40group.calendar.google.com/private-0ddc3b9c19bf2a24a92a2aef3ea4c6b7/basic.ics) to import into your calendar application. + - 👉 Download the official `.ical` [here](https://calendar.google.com/calendar/ical/c_9eae74fd13614c3e7fe4a7189c28f40daa1c1916b9e385352aaf8b940a0094a9%40group.calendar.google.com/private-0ddc3b9c19bf2a24a92a2aef3ea4c6b7/basic.ics) to import into your calendar application. - We also introduced an [OWASP Top 10 for Large Language Model Applications Newsletter](https://llmtop10.beehiiv.com/subscribe) for signup of notifications about the project. - - 👀 The November 2023 newsletter will include a call for opportunity to participate in an open-source project with [Ads](https://github.com/GangGreenTemperTatum) to create a DV-LLMA (Damn Vulnerable LLM Application) to test and hone your skills as well as a fun learning and development experience for LLM application vulnerabilities. -- The OWASP LLM Top 10 continues to translate the list into different languages! This is done by multilingual members (humans) - - If you're fluent in another language and willing to help, email us at: `translations@llmtop10.com` + - 👀 The November 2023 newsletter will include a call for opportunity to participate in an open-source project with [Ads](https://github.com/GangGreenTemperTatum) to create a DV-LLMA (Damn Vulnerable LLM Application) to test and hone your skills as well as a fun learning and development experience for LLM application vulnerabilities. +- The OWASP LLM Top 10 continues to translate the list into different languages! This is done by multilingual members (humans) + - If you're fluent in another language and willing to help, email us at: `translations@llmtop10.com` ## [1.0] - 2023-08-01 ### Added + - Initial official release of the OWASP Top 10 for LLM Applications based on two months of working group efforts. - Engagement from over 485 experts and contributions from over 130 experts in the field of AI and application security. ## [0.9] - 2023-07-18 ### Added + - Second draft of the OWASP Top 10 for LLM Applications based on working group input. ## [0.5] - 2023-07-01 ### Added + - Initial draft of the OWASP Top 10 for LLM Applications based on working group input. ## [0.1] - 2023-05-23 ### Added + - Version 0.1 "straw man" list published - Project inception and approval by the OWASP board. - Project homepage created on the OWASP website. @@ -58,5 +66,7 @@ The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.0.0/), - `Removed`: for now removed features. - `Fixed`: for any bug fixes. - `Security`: in case of vulnerabilities. + ``` +``` diff --git a/info.md b/info.md index 0ad309e5..f53a3e05 100644 --- a/info.md +++ b/info.md @@ -1,6 +1,6 @@ ### Top 10 for Large Language Model Applications Information * [Lab Status Project](https://owasp.org/projects/) -* [Version 1.1.0 Translations](assets/translations/) +* [Version 1.1.0 Translations](https://github.com/OWASP/www-project-top-10-for-large-language-model-applications/tree/main/assets/translations) * [Version 1.1.0](assets/PDF/OWASP-Top-10-for-LLMs-2023-v1_1.pdf) * [Version 1.0.1](assets/PDF/OWASP-Top-10-for-LLMs-2023-v1_0_1.pdf) (archived) * [Version 1.0.0](assets/PDF/OWASP-Top-10-for-LLMs-2023-v1_0.pdf) (archived)