From fb0c8feab252eabf6026fcd6ade5fa34897d7662 Mon Sep 17 00:00:00 2001 From: Talesh Seeparsan Date: Wed, 4 Dec 2024 09:09:27 -0800 Subject: [PATCH] accidentally added the template file --- 2_0_vulns/translations/fa-IR/_template.md | 30 ----------------------- 1 file changed, 30 deletions(-) delete mode 100644 2_0_vulns/translations/fa-IR/_template.md diff --git a/2_0_vulns/translations/fa-IR/_template.md b/2_0_vulns/translations/fa-IR/_template.md deleted file mode 100644 index 99f0e6a7..00000000 --- a/2_0_vulns/translations/fa-IR/_template.md +++ /dev/null @@ -1,30 +0,0 @@ -for additional guidance, refer to [the style guide](../documentation/style/README.md) and to the [glossary](https://github.com/OWASP/www-project-top-10-for-large-language-model-applications/wiki/Definitions) - -## LLMXX: Risk Name - -### Description - -A brief description of the risk that includes its potential effects such as system compromises, data breaches, or other security concerns. - -### Common Examples of Risk - -1. Example 1: Specific instance or type of this risk. -2. Example 2: Another instance or type of this risk. -3. Example 3: Yet another instance or type of this risk. - -### Prevention and Mitigation Strategies - -1. Prevention Step 1: A step or strategy that can be used to prevent the risk or mitigate its effects. -2. Prevention Step 2: Another prevention step or strategy. -3. Prevention Step 3: Yet another prevention step or strategy. - -### Example Attack Scenarios - -Scenario #1: A detailed scenario illustrating how an attacker could potentially exploit this risk, including the attacker's actions and the potential outcomes. - -Scenario #2: Another example of an attack scenario showing a different way the risk could be exploited. - -### Reference Links - -1. [Link Title](URL): **Name of Outlet/Website/Whatever** (Arxiv papers should follow the citation guide posted with the article) -2. [Link Title](URL): **Name of Outlet/Website/Whatever** (Arxiv papers should follow the citation guide posted with the article)