-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathOWASPLLMEcosystemv.01.html
1 lines (1 loc) · 92.1 KB
/
OWASPLLMEcosystemv.01.html
1
<html><head><meta content="text/html; charset=UTF-8" http-equiv="content-type"><style type="text/css">@import url(https://themes.googleusercontent.com/fonts/css?kit=W1UiruHqqwTfeu4SyHHBDPViGq3Ii6Ijn88U-q3D92JhTaF98sH7fwXVaQU9OHogsR_jaQalDEZyjOHWQkqDkqp1S73ouruqnFFTGlhUyYjq2T8QVaaUAncgTQmsvmiQdP8J-hTaGXwcfScBoS_Ntg);.lst-kix_sr0ib5126w3g-7>li:before{content:"\0025cb "}.lst-kix_sr0ib5126w3g-6>li:before{content:"\0025cf "}.lst-kix_sr0ib5126w3g-8>li:before{content:"\0025a0 "}.lst-kix_sr0ib5126w3g-5>li:before{content:"\0025a0 "}.lst-kix_jqwa4fxodgvz-8>li:before{content:"\0025a0 "}.lst-kix_jqwa4fxodgvz-2>li:before{content:"\0025a0 "}.lst-kix_jqwa4fxodgvz-4>li:before{content:"\0025cb "}.lst-kix_jqwa4fxodgvz-3>li:before{content:"\0025cf "}.lst-kix_jqwa4fxodgvz-7>li:before{content:"\0025cb "}ul.lst-kix_38eu28mfwsib-8{list-style-type:none}.lst-kix_jqwa4fxodgvz-6>li:before{content:"\0025cf "}.lst-kix_jqwa4fxodgvz-5>li:before{content:"\0025a0 "}ul.lst-kix_38eu28mfwsib-7{list-style-type:none}ul.lst-kix_38eu28mfwsib-6{list-style-type:none}ul.lst-kix_38eu28mfwsib-5{list-style-type:none}.lst-kix_jqwa4fxodgvz-0>li:before{content:"\0025cf "}ul.lst-kix_38eu28mfwsib-4{list-style-type:none}ul.lst-kix_38eu28mfwsib-3{list-style-type:none}ul.lst-kix_38eu28mfwsib-2{list-style-type:none}ul.lst-kix_38eu28mfwsib-1{list-style-type:none}.lst-kix_jqwa4fxodgvz-1>li:before{content:"\0025cb "}ul.lst-kix_38eu28mfwsib-0{list-style-type:none}ul.lst-kix_iuuzvkxoufsv-7{list-style-type:none}ul.lst-kix_iuuzvkxoufsv-6{list-style-type:none}ul.lst-kix_iuuzvkxoufsv-5{list-style-type:none}ul.lst-kix_iuuzvkxoufsv-4{list-style-type:none}ul.lst-kix_iuuzvkxoufsv-3{list-style-type:none}ul.lst-kix_iuuzvkxoufsv-2{list-style-type:none}ul.lst-kix_iuuzvkxoufsv-1{list-style-type:none}ul.lst-kix_iuuzvkxoufsv-0{list-style-type:none}ul.lst-kix_iuuzvkxoufsv-8{list-style-type:none}ul.lst-kix_jqwa4fxodgvz-8{list-style-type:none}ul.lst-kix_jqwa4fxodgvz-6{list-style-type:none}ul.lst-kix_jqwa4fxodgvz-7{list-style-type:none}ul.lst-kix_jqwa4fxodgvz-4{list-style-type:none}ul.lst-kix_jqwa4fxodgvz-5{list-style-type:none}ul.lst-kix_jqwa4fxodgvz-2{list-style-type:none}ul.lst-kix_jqwa4fxodgvz-3{list-style-type:none}ul.lst-kix_jqwa4fxodgvz-0{list-style-type:none}ul.lst-kix_jqwa4fxodgvz-1{list-style-type:none}.lst-kix_sr0ib5126w3g-0>li:before{content:"\0025cf "}.lst-kix_sr0ib5126w3g-1>li:before{content:"\0025cb "}.lst-kix_sr0ib5126w3g-3>li:before{content:"\0025cf "}.lst-kix_sr0ib5126w3g-2>li:before{content:"\0025a0 "}.lst-kix_sr0ib5126w3g-4>li:before{content:"\0025cb "}.lst-kix_iuuzvkxoufsv-0>li:before{content:"\0025cf "}.lst-kix_sykcwjwuguhv-1>li:before{content:"\0025cb "}.lst-kix_sykcwjwuguhv-0>li:before{content:"\0025cf "}.lst-kix_sykcwjwuguhv-2>li:before{content:"\0025a0 "}.lst-kix_iuuzvkxoufsv-2>li:before{content:"\0025a0 "}.lst-kix_iuuzvkxoufsv-1>li:before{content:"\0025cb "}.lst-kix_iuuzvkxoufsv-4>li:before{content:"\0025cb "}.lst-kix_sykcwjwuguhv-5>li:before{content:"\0025a0 "}.lst-kix_sykcwjwuguhv-6>li:before{content:"\0025cf "}.lst-kix_hiavm9xfuid5-8>li:before{content:"\0025a0 "}.lst-kix_sykcwjwuguhv-7>li:before{content:"\0025cb "}.lst-kix_iuuzvkxoufsv-3>li:before{content:"\0025cf "}.lst-kix_iuuzvkxoufsv-8>li:before{content:"\0025a0 "}.lst-kix_sykcwjwuguhv-8>li:before{content:"\0025a0 "}.lst-kix_4iwpvigtige1-8>li:before{content:"\0025a0 "}.lst-kix_iuuzvkxoufsv-6>li:before{content:"\0025cf "}.lst-kix_iuuzvkxoufsv-5>li:before{content:"\0025a0 "}.lst-kix_38eu28mfwsib-6>li:before{content:"\0025cf "}.lst-kix_38eu28mfwsib-5>li:before{content:"\0025a0 "}.lst-kix_iuuzvkxoufsv-7>li:before{content:"\0025cb "}ul.lst-kix_hiavm9xfuid5-5{list-style-type:none}ul.lst-kix_hiavm9xfuid5-4{list-style-type:none}ul.lst-kix_hiavm9xfuid5-7{list-style-type:none}.lst-kix_4iwpvigtige1-0>li:before{content:"\0025cf "}ul.lst-kix_hiavm9xfuid5-6{list-style-type:none}.lst-kix_4iwpvigtige1-1>li:before{content:"\0025cb "}ul.lst-kix_hiavm9xfuid5-8{list-style-type:none}.lst-kix_hiavm9xfuid5-2>li:before{content:"\0025a0 "}.lst-kix_38eu28mfwsib-7>li:before{content:"\0025cb "}.lst-kix_hiavm9xfuid5-1>li:before{content:"\0025cb "}.lst-kix_38eu28mfwsib-8>li:before{content:"\0025a0 "}.lst-kix_hiavm9xfuid5-0>li:before{content:"\0025cf "}ul.lst-kix_hiavm9xfuid5-1{list-style-type:none}ul.lst-kix_hiavm9xfuid5-0{list-style-type:none}ul.lst-kix_hiavm9xfuid5-3{list-style-type:none}ul.lst-kix_hiavm9xfuid5-2{list-style-type:none}.lst-kix_hiavm9xfuid5-6>li:before{content:"\0025cf "}.lst-kix_4iwpvigtige1-7>li:before{content:"\0025cb "}.lst-kix_hiavm9xfuid5-5>li:before{content:"\0025a0 "}.lst-kix_hiavm9xfuid5-7>li:before{content:"\0025cb "}.lst-kix_4iwpvigtige1-6>li:before{content:"\0025cf "}.lst-kix_4iwpvigtige1-5>li:before{content:"\0025a0 "}.lst-kix_4iwpvigtige1-3>li:before{content:"\0025cf "}.lst-kix_hiavm9xfuid5-3>li:before{content:"\0025cf "}.lst-kix_sykcwjwuguhv-4>li:before{content:"\0025cb "}.lst-kix_4iwpvigtige1-2>li:before{content:"\0025a0 "}.lst-kix_4iwpvigtige1-4>li:before{content:"\0025cb "}.lst-kix_hiavm9xfuid5-4>li:before{content:"\0025cb "}.lst-kix_sykcwjwuguhv-3>li:before{content:"\0025cf "}.lst-kix_vvup3vgqs6ig-6>li:before{content:"\0025cf "}ul.lst-kix_sykcwjwuguhv-2{list-style-type:none}.lst-kix_vvup3vgqs6ig-5>li:before{content:"\0025a0 "}ul.lst-kix_sykcwjwuguhv-3{list-style-type:none}ul.lst-kix_sykcwjwuguhv-4{list-style-type:none}ul.lst-kix_sykcwjwuguhv-5{list-style-type:none}.lst-kix_vvup3vgqs6ig-3>li:before{content:"\0025cf "}ul.lst-kix_sykcwjwuguhv-0{list-style-type:none}.lst-kix_vvup3vgqs6ig-4>li:before{content:"\0025cb "}ul.lst-kix_sykcwjwuguhv-1{list-style-type:none}.lst-kix_vvup3vgqs6ig-1>li:before{content:"\0025cb "}ul.lst-kix_4iwpvigtige1-4{list-style-type:none}ul.lst-kix_4iwpvigtige1-3{list-style-type:none}ul.lst-kix_4iwpvigtige1-2{list-style-type:none}ul.lst-kix_4iwpvigtige1-1{list-style-type:none}ul.lst-kix_sykcwjwuguhv-6{list-style-type:none}ul.lst-kix_4iwpvigtige1-8{list-style-type:none}ul.lst-kix_sykcwjwuguhv-7{list-style-type:none}ul.lst-kix_4iwpvigtige1-7{list-style-type:none}ul.lst-kix_sykcwjwuguhv-8{list-style-type:none}.lst-kix_vvup3vgqs6ig-2>li:before{content:"\0025a0 "}ul.lst-kix_4iwpvigtige1-6{list-style-type:none}ul.lst-kix_4iwpvigtige1-5{list-style-type:none}ul.lst-kix_4iwpvigtige1-0{list-style-type:none}.lst-kix_vvup3vgqs6ig-0>li:before{content:"\0025cf "}ul.lst-kix_vvup3vgqs6ig-4{list-style-type:none}.lst-kix_38eu28mfwsib-3>li:before{content:"\0025cf "}ul.lst-kix_vvup3vgqs6ig-5{list-style-type:none}ul.lst-kix_vvup3vgqs6ig-6{list-style-type:none}.lst-kix_38eu28mfwsib-2>li:before{content:"\0025a0 "}.lst-kix_38eu28mfwsib-4>li:before{content:"\0025cb "}ul.lst-kix_vvup3vgqs6ig-7{list-style-type:none}ul.lst-kix_vvup3vgqs6ig-0{list-style-type:none}ul.lst-kix_vvup3vgqs6ig-1{list-style-type:none}ul.lst-kix_vvup3vgqs6ig-2{list-style-type:none}ul.lst-kix_vvup3vgqs6ig-3{list-style-type:none}.lst-kix_38eu28mfwsib-0>li:before{content:"\0025cf "}.lst-kix_38eu28mfwsib-1>li:before{content:"\0025cb "}li.li-bullet-0:before{margin-left:-18pt;white-space:nowrap;display:inline-block;min-width:18pt}ul.lst-kix_sr0ib5126w3g-8{list-style-type:none}ul.lst-kix_sr0ib5126w3g-3{list-style-type:none}ul.lst-kix_sr0ib5126w3g-2{list-style-type:none}ul.lst-kix_sr0ib5126w3g-1{list-style-type:none}ul.lst-kix_sr0ib5126w3g-0{list-style-type:none}.lst-kix_vvup3vgqs6ig-7>li:before{content:"\0025cb "}ul.lst-kix_vvup3vgqs6ig-8{list-style-type:none}ul.lst-kix_sr0ib5126w3g-7{list-style-type:none}ul.lst-kix_sr0ib5126w3g-6{list-style-type:none}.lst-kix_vvup3vgqs6ig-8>li:before{content:"\0025a0 "}ul.lst-kix_sr0ib5126w3g-5{list-style-type:none}ul.lst-kix_sr0ib5126w3g-4{list-style-type:none}ol{margin:0;padding:0}table td,table th{padding:0}.c22{border-right-style:solid;padding:5pt 5pt 5pt 5pt;border-bottom-color:#000000;border-top-width:1pt;border-right-width:1pt;border-left-color:#000000;vertical-align:top;border-right-color:#000000;border-left-width:1pt;border-top-style:solid;background-color:#ffffff;border-left-style:solid;border-bottom-width:1pt;width:165pt;border-top-color:#000000;border-bottom-style:solid}.c43{border-right-style:solid;padding:5pt 5pt 5pt 5pt;border-bottom-color:#000000;border-top-width:1pt;border-right-width:1pt;border-left-color:#000000;vertical-align:top;border-right-color:#000000;border-left-width:1pt;border-top-style:solid;background-color:#ffffff;border-left-style:solid;border-bottom-width:1pt;width:162pt;border-top-color:#000000;border-bottom-style:solid}.c61{border-right-style:solid;padding:5pt 5pt 5pt 5pt;border-bottom-color:#000000;border-top-width:1pt;border-right-width:1pt;border-left-color:#000000;vertical-align:top;border-right-color:#000000;border-left-width:1pt;border-top-style:solid;background-color:#134f5c;border-left-style:solid;border-bottom-width:1pt;width:162pt;border-top-color:#000000;border-bottom-style:solid}.c39{border-right-style:solid;padding:7pt 7pt 7pt 7pt;border-bottom-color:#9e9e9e;border-top-width:1.1pt;border-right-width:1.1pt;border-left-color:#9e9e9e;vertical-align:top;border-right-color:#9e9e9e;border-left-width:1.1pt;border-top-style:solid;border-left-style:solid;border-bottom-width:1.1pt;width:94.5pt;border-top-color:#9e9e9e;border-bottom-style:solid}.c87{border-right-style:solid;padding:7pt 7pt 7pt 7pt;border-bottom-color:#9e9e9e;border-top-width:1.1pt;border-right-width:1.1pt;border-left-color:#9e9e9e;vertical-align:top;border-right-color:#9e9e9e;border-left-width:1.1pt;border-top-style:solid;border-left-style:solid;border-bottom-width:1.1pt;width:104.2pt;border-top-color:#9e9e9e;border-bottom-style:solid}.c57{border-right-style:solid;padding:5pt 5pt 5pt 5pt;border-bottom-color:#000000;border-top-width:1pt;border-right-width:1pt;border-left-color:#000000;vertical-align:top;border-right-color:#000000;border-left-width:1pt;border-top-style:solid;border-left-style:solid;border-bottom-width:1pt;width:172.5pt;border-top-color:#000000;border-bottom-style:solid}.c110{border-right-style:solid;padding:5pt 5pt 5pt 5pt;border-bottom-color:#000000;border-top-width:1pt;border-right-width:1pt;border-left-color:#000000;vertical-align:top;border-right-color:#000000;border-left-width:1pt;border-top-style:solid;border-left-style:solid;border-bottom-width:1pt;width:316.5pt;border-top-color:#000000;border-bottom-style:solid}.c101{border-right-style:solid;padding:5pt 5pt 5pt 5pt;border-bottom-color:#000000;border-top-width:1pt;border-right-width:1pt;border-left-color:#000000;vertical-align:top;border-right-color:#000000;border-left-width:1pt;border-top-style:solid;border-left-style:solid;border-bottom-width:1pt;width:315pt;border-top-color:#000000;border-bottom-style:solid}.c54{border-right-style:solid;padding:7pt 7pt 7pt 7pt;border-bottom-color:#9e9e9e;border-top-width:1.1pt;border-right-width:1.1pt;border-left-color:#9e9e9e;vertical-align:top;border-right-color:#9e9e9e;border-left-width:1.1pt;border-top-style:solid;border-left-style:solid;border-bottom-width:1.1pt;width:175.5pt;border-top-color:#9e9e9e;border-bottom-style:solid}.c13{border-right-style:solid;padding:7pt 7pt 7pt 7pt;border-bottom-color:#9e9e9e;border-top-width:1.1pt;border-right-width:1.1pt;border-left-color:#9e9e9e;vertical-align:top;border-right-color:#9e9e9e;border-left-width:1.1pt;border-top-style:solid;border-left-style:solid;border-bottom-width:1.1pt;width:171.8pt;border-top-color:#9e9e9e;border-bottom-style:solid}.c106{border-right-style:solid;padding:5pt 5pt 5pt 5pt;border-bottom-color:#000000;border-top-width:1pt;border-right-width:1pt;border-left-color:#000000;vertical-align:top;border-right-color:#000000;border-left-width:1pt;border-top-style:solid;border-left-style:solid;border-bottom-width:1pt;width:165pt;border-top-color:#000000;border-bottom-style:solid}.c37{border-right-style:solid;padding:5pt 5pt 5pt 5pt;border-bottom-color:#000000;border-top-width:1pt;border-right-width:1pt;border-left-color:#000000;vertical-align:top;border-right-color:#000000;border-left-width:1pt;border-top-style:solid;border-left-style:solid;border-bottom-width:1pt;width:138.8pt;border-top-color:#000000;border-bottom-style:solid}.c40{border-right-style:solid;padding:5pt 5pt 5pt 5pt;border-bottom-color:#000000;border-top-width:1pt;border-right-width:1pt;border-left-color:#000000;vertical-align:top;border-right-color:#000000;border-left-width:1pt;border-top-style:solid;border-left-style:solid;border-bottom-width:1pt;width:141pt;border-top-color:#000000;border-bottom-style:solid}.c68{border-right-style:solid;padding:5pt 5pt 5pt 5pt;border-bottom-color:#000000;border-top-width:1pt;border-right-width:1pt;border-left-color:#000000;vertical-align:top;border-right-color:#000000;border-left-width:1pt;border-top-style:solid;border-left-style:solid;border-bottom-width:1pt;width:151.5pt;border-top-color:#000000;border-bottom-style:solid}.c18{border-right-style:solid;padding:7pt 7pt 7pt 7pt;border-bottom-color:#9e9e9e;border-top-width:1.1pt;border-right-width:1.1pt;border-left-color:#9e9e9e;vertical-align:top;border-right-color:#9e9e9e;border-left-width:1.1pt;border-top-style:solid;border-left-style:solid;border-bottom-width:1.1pt;width:187.5pt;border-top-color:#9e9e9e;border-bottom-style:solid}.c55{border-right-style:solid;padding:5pt 5pt 5pt 5pt;border-bottom-color:#000000;border-top-width:1pt;border-right-width:1pt;border-left-color:#000000;vertical-align:top;border-right-color:#000000;border-left-width:1pt;border-top-style:solid;border-left-style:solid;border-bottom-width:1pt;width:160.5pt;border-top-color:#000000;border-bottom-style:solid}.c84{border-right-style:solid;padding:7pt 7pt 7pt 7pt;border-bottom-color:#9e9e9e;border-top-width:1.1pt;border-right-width:1.1pt;border-left-color:#9e9e9e;vertical-align:top;border-right-color:#9e9e9e;border-left-width:1.1pt;border-top-style:solid;border-left-style:solid;border-bottom-width:1.1pt;width:117pt;border-top-color:#9e9e9e;border-bottom-style:solid}.c80{border-right-style:solid;padding:5pt 5pt 5pt 5pt;border-bottom-color:#000000;border-top-width:1pt;border-right-width:1pt;border-left-color:#000000;vertical-align:top;border-right-color:#000000;border-left-width:1pt;border-top-style:solid;border-left-style:solid;border-bottom-width:1pt;width:281.2pt;border-top-color:#000000;border-bottom-style:solid}.c8{border-right-style:solid;padding:7pt 7pt 7pt 7pt;border-bottom-color:#9e9e9e;border-top-width:1.1pt;border-right-width:1.1pt;border-left-color:#9e9e9e;vertical-align:top;border-right-color:#9e9e9e;border-left-width:1.1pt;border-top-style:solid;border-left-style:solid;border-bottom-width:1.1pt;width:209.2pt;border-top-color:#9e9e9e;border-bottom-style:solid}.c23{border-right-style:solid;padding:5pt 5pt 5pt 5pt;border-bottom-color:#000000;border-top-width:1pt;border-right-width:1pt;border-left-color:#000000;vertical-align:top;border-right-color:#000000;border-left-width:1pt;border-top-style:solid;border-left-style:solid;border-bottom-width:1pt;width:142.5pt;border-top-color:#000000;border-bottom-style:solid}.c6{margin-left:-54pt;padding-top:0pt;text-indent:-31.5pt;padding-bottom:0pt;line-height:1.0;page-break-after:avoid;orphans:2;widows:2;text-align:left;margin-right:-72pt}.c56{padding-top:0pt;text-indent:36pt;padding-bottom:12pt;line-height:0.9500000000000001;page-break-after:avoid;orphans:2;widows:2;text-align:center;margin-right:-72pt}.c28{margin-left:-31.5pt;padding-top:0pt;text-indent:31.5pt;padding-bottom:0pt;line-height:1.0;orphans:2;widows:2;text-align:left;margin-right:-36pt}.c4{margin-left:36pt;padding-top:0pt;padding-left:0pt;padding-bottom:0pt;line-height:1.15;orphans:2;widows:2;text-align:left;margin-right:-72pt}.c3{margin-left:18pt;padding-top:0pt;padding-left:0pt;padding-bottom:0pt;line-height:1.15;orphans:2;widows:2;text-align:left;margin-right:-72pt}.c69{padding-top:0pt;padding-bottom:0pt;line-height:1.5;orphans:2;widows:2;text-align:left;margin-right:-72pt;height:10pt}.c2{padding-top:0pt;padding-bottom:0pt;line-height:1.0;orphans:2;widows:2;text-align:left;margin-right:-72pt;height:10pt}.c1{padding-top:0pt;text-indent:-27pt;padding-bottom:0pt;line-height:1.15;orphans:2;widows:2;text-align:left;margin-right:-72pt}.c50{padding-top:0pt;padding-bottom:0pt;line-height:1.0;orphans:2;widows:2;text-align:center;margin-right:-72pt;height:10pt}.c66{padding-top:0pt;padding-bottom:12pt;line-height:1.1500000000000001;orphans:2;widows:2;text-align:left;margin-right:-72pt;height:10pt}.c44{color:#000000;font-weight:600;text-decoration:none;vertical-align:baseline;font-size:10pt;font-family:"Poppins";font-style:normal}.c15{color:#000000;font-weight:400;text-decoration:none;vertical-align:baseline;font-size:10pt;font-family:"Barlow";font-style:italic}.c53{color:#0c343d;font-weight:500;text-decoration:none;vertical-align:baseline;font-size:11pt;font-family:"Poppins";font-style:normal}.c42{color:#000000;font-weight:700;text-decoration:none;vertical-align:baseline;font-size:11pt;font-family:"Barlow";font-style:normal}.c7{color:#000000;font-weight:400;text-decoration:none;vertical-align:baseline;font-size:10pt;font-family:"Barlow";font-style:normal}.c21{color:#000000;font-weight:400;text-decoration:none;vertical-align:baseline;font-size:11pt;font-family:"Arial";font-style:normal}.c5{color:#ffffff;font-weight:700;text-decoration:none;vertical-align:baseline;font-size:18pt;font-family:"Barlow";font-style:normal}.c48{color:#0c343d;font-weight:500;text-decoration:none;vertical-align:baseline;font-size:20pt;font-family:"Poppins";font-style:normal}.c14{color:#f3f3f3;font-weight:700;text-decoration:none;vertical-align:baseline;font-size:11pt;font-family:"Barlow";font-style:normal}.c20{padding-top:0pt;padding-bottom:0pt;line-height:1.15;orphans:2;widows:2;text-align:left;margin-right:-72pt}.c85{color:#000000;font-weight:700;text-decoration:none;vertical-align:baseline;font-size:36pt;font-family:"Poppins";font-style:normal}.c47{color:#000000;font-weight:700;text-decoration:none;vertical-align:baseline;font-size:22pt;font-family:"Barlow";font-style:normal}.c17{padding-top:0pt;padding-bottom:0pt;line-height:1.0;orphans:2;widows:2;text-align:left;margin-right:-72pt}.c33{color:#000000;font-weight:700;text-decoration:none;vertical-align:baseline;font-size:12pt;font-family:"Barlow";font-style:normal}.c102{color:#000000;font-weight:600;text-decoration:none;vertical-align:baseline;font-size:14pt;font-family:"Poppins";font-style:normal}.c62{color:#0c343d;font-weight:600;text-decoration:none;vertical-align:baseline;font-size:16pt;font-family:"Poppins";font-style:normal}.c83{color:#000000;font-weight:700;text-decoration:none;vertical-align:baseline;font-size:24pt;font-family:"Barlow";font-style:normal}.c105{color:#0c343d;font-weight:700;text-decoration:none;vertical-align:baseline;font-size:16pt;font-family:"Arial";font-style:normal}.c16{color:#0c343d;font-weight:500;text-decoration:none;vertical-align:baseline;font-size:14pt;font-family:"Poppins";font-style:normal}.c38{color:#000000;font-weight:700;text-decoration:none;vertical-align:baseline;font-size:11pt;font-family:"Arial";font-style:normal}.c103{color:#0c343d;font-weight:700;text-decoration:none;vertical-align:baseline;font-size:10pt;font-family:"Arial";font-style:normal}.c104{color:#000000;font-weight:500;text-decoration:none;vertical-align:baseline;font-size:10pt;font-family:"Barlow";font-style:normal}.c88{color:#ffffff;font-weight:600;text-decoration:none;vertical-align:baseline;font-size:10pt;font-family:"Poppins";font-style:normal}.c98{color:#595959;font-weight:700;text-decoration:none;vertical-align:baseline;font-size:14pt;font-family:"Poppins";font-style:normal}.c0{margin-left:36pt;padding-top:3pt;padding-bottom:0pt;line-height:1.0;text-align:left;margin-right:-72pt}.c107{color:#0c343d;font-weight:400;text-decoration:none;vertical-align:baseline;font-family:"Barlow";font-style:normal}.c26{padding-top:0pt;padding-bottom:0pt;line-height:1.0;text-align:left;margin-right:-72pt;height:10pt}.c25{margin-left:54pt;padding-top:3pt;padding-bottom:0pt;line-height:1.0;text-align:left;margin-right:-72pt}.c36{padding-top:0pt;padding-bottom:0pt;line-height:1.0;text-align:left;margin-right:-72pt}.c91{padding-top:0pt;padding-bottom:0pt;line-height:1.0;text-align:left;margin-right:-36pt}.c67{padding-top:0pt;padding-bottom:0pt;line-height:1.0;text-align:center;margin-right:-72pt}.c65{padding-top:3pt;padding-bottom:0pt;line-height:1.0;text-align:left;margin-right:-72pt}.c92{padding-top:0pt;padding-bottom:12pt;line-height:1.1500000000000001;text-align:left;margin-right:-72pt}.c108{font-size:18pt;font-family:"Barlow";color:#ffffff;font-weight:700}.c99{font-size:14pt;font-family:"Barlow";color:#ffffff;font-weight:600}.c30{font-size:14pt;font-family:"Barlow";color:#ffffff;font-weight:200}.c41{text-decoration-skip-ink:none;-webkit-text-decoration-skip:none;text-decoration:underline}.c24{border-spacing:0;border-collapse:collapse;margin-right:auto}.c82{font-size:35.5pt;font-family:"Poppins";font-weight:700}.c100{font-size:24pt;font-family:"Poppins";font-weight:700}.c59{margin-left:13.5pt;padding-left:0pt}.c51{margin-left:36pt;padding-left:0pt}.c58{margin-left:20.2pt;padding-left:0pt}.c109{max-width:396pt;padding:72pt 108pt 72pt 108pt}.c19{margin-left:-31.5pt;page-break-after:avoid}.c78{margin-left:54pt;text-indent:-31.5pt}.c12{color:inherit;text-decoration:inherit}.c31{margin-left:-49.5pt;text-indent:-4.5pt}.c35{text-indent:-4.5pt;page-break-after:avoid}.c34{padding:0;margin:0}.c71{orphans:2;widows:2}.c32{height:71.2pt}.c75{margin-left:18pt}.c77{height:15.8pt}.c11{margin-left:-27pt}.c89{margin-left:-46.5pt}.c72{text-indent:-4.5pt}.c45{background-color:#ffffff}.c27{background-color:#45818e}.c63{margin-left:-87.8pt}.c95{margin-left:-51pt}.c70{margin-left:-81pt}.c9{height:24pt}.c60{height:20pt}.c49{height:30pt}.c81{font-size:20pt}.c79{height:27pt}.c86{height:10pt}.c93{page-break-after:avoid}.c96{margin-left:-48pt}.c46{height:14pt}.c97{height:21.2pt}.c64{margin-left:-67.5pt}.c94{height:11pt}.c90{text-indent:-27pt}.c74{margin-left:36pt}.c76{text-indent:31.5pt}.c73{background-color:#134f5c}.c52{background-color:#efefef}.c10{margin-left:11.2pt}.c29{height:0pt}.title{padding-top:0pt;color:#000000;font-weight:700;font-size:36pt;padding-bottom:0pt;font-family:"Poppins";line-height:1.0;page-break-after:avoid;orphans:2;widows:2;text-align:center}.subtitle{padding-top:0pt;color:#000000;font-weight:700;font-size:24pt;padding-bottom:0pt;font-family:"Barlow";line-height:1.0;page-break-after:avoid;orphans:2;widows:2;text-align:center}li{color:#000000;font-size:10pt;font-family:"Barlow"}p{margin:0;color:#000000;font-size:10pt;font-family:"Barlow"}h1{padding-top:0pt;color:#0c343d;font-weight:500;font-size:20pt;padding-bottom:0pt;font-family:"Poppins";line-height:1.0;page-break-after:avoid;orphans:2;widows:2;text-align:center}h2{padding-top:0pt;color:#0c343d;font-weight:600;font-size:16pt;padding-bottom:0pt;font-family:"Poppins";line-height:1.0;page-break-after:avoid;orphans:2;widows:2;text-align:center}h3{padding-top:0pt;color:#0c343d;font-weight:500;font-size:14pt;padding-bottom:0pt;font-family:"Poppins";line-height:1.0;page-break-after:avoid;orphans:2;widows:2;text-align:left}h4{padding-top:0pt;color:#0c343d;font-weight:500;font-size:11pt;padding-bottom:0pt;font-family:"Poppins";line-height:1.0;page-break-after:avoid;orphans:2;widows:2;text-align:left}h5{padding-top:0pt;color:#000000;font-weight:500;font-size:10pt;padding-bottom:0pt;font-family:"Poppins";line-height:1.0;page-break-after:avoid;orphans:2;widows:2;text-align:left}h6{padding-top:12pt;color:#666666;font-size:11pt;padding-bottom:4pt;font-family:"Barlow";line-height:1.0;page-break-after:avoid;font-style:italic;orphans:2;widows:2;text-align:left}</style></head><body class="c45 c109 doc-content"><div><p class="c28"><span class="c30"> | </span><span class="c99"> Top 10 for LLM / Gen AI Cybersecurity Solution Landscape Guide</span><span style="overflow: hidden; display: inline-block; margin: 0.00px 0.00px; border: 0.00px solid #000000; transform: rotate(0.00rad) translateZ(0px); -webkit-transform: rotate(0.00rad) translateZ(0px); width: 821.00px; height: 72.36px;"><img alt="" src="images/image2.png" style="width: 821.00px; height: 72.36px; margin-left: 0.00px; margin-top: 0.00px; transform: rotate(0.00rad) translateZ(0px); -webkit-transform: rotate(0.00rad) translateZ(0px);" title=""></span></p><p class="c71 c11 c86 c91"><span class="c7"></span></p></div><p class="c2 c11"><span class="c7"></span></p><p class="c2 c11"><span class="c7"></span></p><p class="c2 c11"><span class="c7"></span></p><p class="c2 c11"><span class="c7"></span></p><p class="c2 c11"><span class="c7"></span></p><p class="c2 c11"><span class="c7"></span></p><p class="c2 c11"><span class="c7"></span></p><p class="c2 c11"><span class="c7"></span></p><p class="c2 c11"><span class="c7"></span></p><p class="c2 c11"><span class="c7"></span></p><p class="c2 c11"><span class="c7"></span></p><p class="c2 c11"><span class="c7"></span></p><p class="c2 c11"><span class="c7"></span></p><p class="c67 c71 c11 c93 title" id="h.qemm6t9nu4y8"><span class="c85">LLM AI Cybersecurity Open Source Ecosystem Guide</span></p><p class="c67 c78 c71 c93 subtitle" id="h.3gakmnbt43br"><span class="c82"> </span><span style="overflow: hidden; display: inline-block; margin: 0.00px 0.00px; border: 0.00px solid #000000; transform: rotate(0.00rad) translateZ(0px); -webkit-transform: rotate(0.00rad) translateZ(0px); width: 821.01px; height: 1061.00px;"><img alt="" src="images/image1.png" style="width: 821.01px; height: 1061.00px; margin-left: 0.00px; margin-top: 0.00px; transform: rotate(0.00rad) translateZ(0px); -webkit-transform: rotate(0.00rad) translateZ(0px);" title=""></span><span class="c83">From the OWASP Top 10 for LLM Applications Team</span></p><p class="c50 c78"><span class="c47"></span></p><p class="c50 c78"><span class="c47"></span></p><p class="c50 c78"><span class="c47"></span></p><p class="c66 c11"><span class="c5"></span></p><p class="c11 c66"><span class="c5"></span></p><p class="c71 c11 c72 c92"><span class="c108">Version: 0.1<br>Published: Target: Mid-March 2024</span><hr style="page-break-before:always;display:none;"></p><p class="c17 c31"><span class="c102">Revision History</span></p><p class="c2 c11"><span class="c105"></span></p><a id="t.32da8f77156a3f45fa7ea88369e8b8a8f2c36c4e"></a><a id="t.0"></a><table class="c24 c95"><tr class="c79"><td class="c84 c52" colspan="1" rowspan="1"><p class="c17"><span class="c103">Revision</span></p></td><td class="c39 c52" colspan="1" rowspan="1"><p class="c17"><span class="c103">Date</span></p></td><td class="c87 c52" colspan="1" rowspan="1"><p class="c17"><span class="c103">Authors</span></p></td><td class="c54 c52" colspan="1" rowspan="1"><p class="c17"><span class="c103">Description</span></p></td></tr><tr class="c79"><td class="c84" colspan="1" rowspan="1"><p class="c17"><span class="c7">.1</span></p></td><td class="c39" colspan="1" rowspan="1"><p class="c17"><span class="c7">3/3/2024</span></p></td><td class="c87" colspan="1" rowspan="1"><p class="c17"><span class="c7">Scott Clinton</span></p></td><td class="c54" colspan="1" rowspan="1"><p class="c17"><span class="c7">Initial Draft</span></p></td></tr><tr class="c97"><td class="c84" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td><td class="c39" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td><td class="c87" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td><td class="c54" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td></tr><tr class="c77"><td class="c84" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td><td class="c39" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td><td class="c87" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td><td class="c54" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td></tr></table><p class="c2 c11"><span class="c105"></span></p><p class="c17 c11"><span>The information provided in this document does not, and is not intended to, constitute legal advice. All information is for general informational purposes only. This document contains links to other third-party websites. Such links are only for convenience and OWASP does not recommend or endorse the contents of the third-party sites.</span></p><hr style="page-break-before:always;display:none;"><p class="c2 c11 c72"><span class="c7"></span></p><p class="c67 c71 c11"><span class="c100">Contents</span></p><p class="c65"><span class="c33"><a class="c12" href="#h.4ie01p2a7xs0">Overview and Definitions 4</a></span></p><p class="c65 c75"><span class="c21"><a class="c12" href="#h.oresuivlup0a">Objectives 4</a></span></p><p class="c65 c75"><span class="c21"><a class="c12" href="#h.neurwetvjc5p">LLM and Gen AI Lifecycle Categories 4</a></span></p><p class="c0"><span class="c21"><a class="c12" href="#h.xzic4m66wtyb">Data Preparation 4</a></span></p><p class="c25"><span class="c21"><a class="c12" href="#h.c7kkbgquu6s2">Security Controls and Solutions Specific to Data Preparation 5</a></span></p><p class="c0"><span class="c21"><a class="c12" href="#h.4539umcc2qpr">Building 6</a></span></p><p class="c25"><span class="c21"><a class="c12" href="#h.4vnnsoltn19h">Security Controls and Solutions Specific to Model Building 6</a></span></p><p class="c0"><span class="c21"><a class="c12" href="#h.xxtaufcvij9o">Provisioning and Serving 6</a></span></p><p class="c25"><span class="c21"><a class="c12" href="#h.mkesfm8p6nwg">Security Controls and Solutions Specific to Provisioning and Serving 7</a></span></p><p class="c0"><span class="c21"><a class="c12" href="#h.hm3rf5w26190">Observability/Monitoring 7</a></span></p><p class="c25"><span class="c21"><a class="c12" href="#h.2wh1tcsvtjfp">Security Controls and Solutions Specific to Observability and Monitoring 8</a></span></p><p class="c0"><span class="c21"><a class="c12" href="#h.7e7nwihtrtg0">Consumption 8</a></span></p><p class="c25"><span class="c21"><a class="c12" href="#h.7kx5p3mhror5">Security Controls and Solutions Specific to Model Consumption 9</a></span></p><p class="c0"><span class="c21"><a class="c12" href="#h.e9ej6jl8zu96">Ethical and Compliance Governance 9</a></span></p><p class="c25"><span class="c21"><a class="c12" href="#h.bbla0iv8oa9o">Security Controls and Solutions Specific to Ethical Compliance Governance 10</a></span></p><p class="c65"><span class="c42"><a class="c12" href="#h.6ln1ueaud5t0">OWASP LLM and Generative AI CyberSecurity <br>Ecosystem Solution Maps 11</a></span></p><p class="c0"><span class="c21"><a class="c12" href="#h.ur97bzrzlko">OPEN SOURCE 11</a></span></p><p class="c0"><span class="c21"><a class="c12" href="#h.42f8rjt1j8h5">COMMERCIAL 11</a></span></p><p class="c65"><span class="c38"><a class="c12" href="#h.5z51d2e1q4nk">Top 10 for LLM Solution Details 12</a></span></p><p class="c65 c75"><span class="c21"><a class="c12" href="#h.k0xljaeqq1fe">Open Source 12</a></span></p><p class="c0"><span class="c21"><a class="c12" href="#h.emnqjz1y4em4">Ethical and Compliance Governance 12</a></span></p><p class="c0"><span class="c21"><a class="c12" href="#h.s3wnmfubrdl6">Consumption 12</a></span></p><p class="c0"><span class="c21"><a class="c12" href="#h.v6beoad5o573">Observability/Monitoring 12</a></span></p><p class="c0"><span class="c21"><a class="c12" href="#h.3ulf1bjyepq6">Serving and Deployment 13</a></span></p><p class="c0"><span class="c21"><a class="c12" href="#h.xl4h3wk5bu1g">Building 13</a></span></p><p class="c0"><span class="c21"><a class="c12" href="#h.fc1wxbe8pruj">Data 14</a></span></p><p class="c65"><span class="c38"><a class="c12" href="#h.ba3smqf8lm2c">Top 10 for LLM Solution Details<br>Commercial 15</a></span></p><p class="c0"><span class="c21"><a class="c12" href="#h.nhn7r245yjvj">Ethical and Compliance Governance 15</a></span></p><p class="c0"><span class="c21"><a class="c12" href="#h.2y2el4kq174d">Consumption 15</a></span></p><p class="c0"><span class="c21"><a class="c12" href="#h.wbtpiuj556bl">Observability/Monitoring 15</a></span></p><p class="c0"><span class="c21"><a class="c12" href="#h.tt4saex4112g">Serving and Deployment 16</a></span></p><p class="c0"><span class="c21"><a class="c12" href="#h.8l3krvjbcbtz">Building 16</a></span></p><p class="c0"><span class="c21"><a class="c12" href="#h.7stsvoep6cjt">Data 17</a></span></p><p class="c65"><span class="c42"><a class="c12" href="#h.dgzsiefrwk22">OWASP Top 10 for LLM Project Supporters 18</a></span></p><p class="c65"><span class="c38"><a class="c12" href="#h.2o4oxv90v53b">OWASP Top 10 for LLM Project Contributors 19</a></span></p><p class="c11 c69"><span class="c7"></span></p><h1 class="c67 c35 c71 c11" id="h.4ie01p2a7xs0"><span>Overview and Definitions</span></h1><h4 class="c17 c19 c94" id="h.6w8p2ikqc61b"><span class="c53"></span></h4><h2 class="c17 c35 c11" id="h.oresuivlup0a"><span class="c62">Objectives</span></h2><p class="c2 c11"><span class="c7"></span></p><p class="c17 c11"><span class="c7">As organizations face the challenges of how to secure against the threats presented by LLMs and Generative AI, there are both solutions Today that can be leveraged in support of both laying the foundation for securing companies to address the LLM Top 10 vulnerabilities as well as solutions that need to be developed to create close the gaps on new vectors of attack not previously considered.</span></p><p class="c2 c11"><span class="c7"></span></p><p class="c17 c11"><span class="c7">The objective of this document is to provide CISOs and Security analysts with insights into Open Source, Commercial and Emerging Solutions to address these areas.</span></p><p class="c2 c11"><span class="c7"></span></p><p class="c17 c11"><span class="c7">This document is not to be considered a complete list, nor is it a recommendation of one solution over another. It is intended to provide as up-to-date a list as the community can provide as an educational tool for organizations to begin to put processes and technologies in place to secure their applications. </span></p><p class="c2 c11"><span class="c7"></span></p><h2 class="c17 c11 c35" id="h.neurwetvjc5p"><span class="c62">LLM and Gen AI Lifecycle Categories</span></h2><p class="c2 c11"><span class="c7"></span></p><p class="c17 c11"><span class="c7">For the purposes of categorizing security solutions and their applicability both across the LLM and Generative AI Solutions we have created the following categories map, and descriptions that at this point in time best align to the application development, provisioning and usage patterns.</span></p><p class="c2 c11"><span class="c7"></span></p><a id="t.f17cc680ef38b133f11d3939c6931a4f0db01c22"></a><a id="t.1"></a><table class="c11 c24"><tr class="c60"><td class="c40" colspan="1" rowspan="1"><p class="c36"><span class="c44">Model Lifecycle Stages</span></p></td><td class="c80" colspan="2" rowspan="1"><p class="c36"><span class="c44">Security Solution / Control Categories</span></p></td></tr><tr class="c29"><td class="c40" colspan="1" rowspan="1"><p class="c36"><span class="c15">Ethical and Compliance Governance</span></p></td><td class="c23" colspan="1" rowspan="1"><p class="c26"><span class="c7"></span></p></td><td class="c37" colspan="1" rowspan="1"><p class="c26"><span class="c7"></span></p></td></tr><tr class="c29"><td class="c40" colspan="1" rowspan="1"><p class="c36"><span class="c15">Consumption</span></p></td><td class="c23" colspan="1" rowspan="1"><p class="c36"><span class="c7">Continuous Red Teaming</span></p><p class="c36"><span class="c7">Detection and Response</span></p><p class="c36"><span class="c7">Data Leak Protection</span></p></td><td class="c37" colspan="1" rowspan="1"><p class="c26"><span class="c7"></span></p></td></tr><tr class="c29"><td class="c40" colspan="1" rowspan="1"><p class="c36"><span class="c15">Observability/Monitoring</span></p></td><td class="c23" colspan="1" rowspan="1"><p class="c26"><span class="c7"></span></p></td><td class="c37" colspan="1" rowspan="1"><p class="c26"><span class="c7"></span></p></td></tr><tr class="c29"><td class="c40" colspan="1" rowspan="1"><p class="c36"><span class="c15">Serving and Deployment</span></p></td><td class="c23" colspan="1" rowspan="1"><p class="c26"><span class="c7"></span></p></td><td class="c37" colspan="1" rowspan="1"><p class="c26"><span class="c7"></span></p></td></tr><tr class="c29"><td class="c40" colspan="1" rowspan="1"><p class="c36"><span class="c15">Building</span></p></td><td class="c23" colspan="1" rowspan="1"><p class="c26"><span class="c7"></span></p></td><td class="c37" colspan="1" rowspan="1"><p class="c26"><span class="c7"></span></p></td></tr><tr class="c29"><td class="c40" colspan="1" rowspan="1"><p class="c36"><span class="c15">Data Preparation</span></p></td><td class="c23" colspan="1" rowspan="1"><p class="c26"><span class="c7"></span></p></td><td class="c37" colspan="1" rowspan="1"><p class="c26"><span class="c7"></span></p></td></tr></table><p class="c17 c11"><span class="c7"> </span></p><h3 class="c17 c19" id="h.xzic4m66wtyb"><span class="c16">Data Preparation</span></h3><p class="c2 c11"><span class="c7"></span></p><p class="c20 c11"><span class="c7">The process of data model preparation for Large Language Models (LLMs) and generative AI involves several critical steps, ensuring the model is trained on high-quality, diverse, and relevant datasets. This preparation is vital for the model's ability to generate accurate, coherent, and contextually appropriate responses. Here's a comprehensive description of the process:</span></p><p class="c2 c11"><span class="c7"></span></p><ul class="c34 lst-kix_4iwpvigtige1-0 start"><li class="c20 c59 li-bullet-0"><span class="c41">Data Collection:</span><span class="c7"> Gather a broad and diverse range of text data from various sources to cover numerous topics, styles, and languages.</span></li><li class="c20 c59 li-bullet-0"><span class="c41">Data Cleaning and Preprocessing</span><span class="c7">: Remove irrelevant content, correct errors, standardize formats, and eliminate personally identifiable information to protect privacy.</span></li><li class="c20 c59 li-bullet-0"><span class="c41">Data Annotation:</span><span class="c7"> For specific tasks, label the data to describe features or answers, using manual, semi-automatic, or automatic methods.</span></li><li class="c20 c59 li-bullet-0"><span class="c41">Data Augmentation:</span><span class="c7"> Increase dataset diversity without collecting more data through techniques like paraphrasing, translating, or using generative models to create new data.</span></li><li class="c20 c59 li-bullet-0"><span class="c41">Dataset Splitting:</span><span class="c7"> Divide the dataset into training, validation, and testing sets to train the model, tune hyperparameters, and evaluate performance on unseen data.</span></li><li class="c20 c59 li-bullet-0"><span class="c41">Feature Extraction and Tokenization:</span><span class="c7"> Convert text into a model-understandable format by splitting it into tokens and extracting features, preparing it for learning.</span></li><li class="c20 c59 li-bullet-0"><span class="c41">Training Data Preparation</span><span class="c7">: Organize the processed data into batches and sequences suitable for the model, ensuring compatibility with the model architecture.</span></li><li class="c20 c59 li-bullet-0"><span class="c41">Ethical Considerations and Bias Mitigation:</span><span class="c7"> Address ethical concerns and mitigate biases by ensuring data diversity, fairness, and avoiding propagation of stereotypes or misinformation.</span></li></ul><p class="c2"><span class="c7"></span></p><h4 class="c17 c19 c76" id="h.c7kkbgquu6s2"><span class="c53">Security Controls and Solutions Specific to Data Preparation</span></h4><p class="c2 c10"><span class="c7"></span></p><p class="c20 c10"><span class="c7">Securing the data preparation process for models, especially Large Language Models (LLMs) and generative AI, involves implementing a variety of tools and controls. These measures are crucial for protecting the data from unauthorized access, ensuring data integrity, and complying with legal and ethical standards. Here’s a list categorized into tools and control categories:</span></p><p class="c2 c10"><span class="c7"></span></p><ul class="c34 lst-kix_jqwa4fxodgvz-0 start"><li class="c4 li-bullet-0"><span class="c41">Data Masking and Anonymization:</span><span class="c7"> Used to remove or obfuscate personally identifiable information (PII) to protect privacy.</span></li><li class="c4 li-bullet-0"><span class="c41">Encryption: </span><span class="c7">Ensure data at rest and in transit is encrypted, protecting it from interception or unauthorized access.</span></li><li class="c4 li-bullet-0"><span class="c41">Access Control:</span><span class="c7"> Limit data access to authorized personnel only, based on their roles and the principle of least privilege.</span></li><li class="c4 li-bullet-0"><span class="c41">Data Loss Prevention (DLP) Software</span><span class="c7">: Prevent sensitive data from being leaked or misused.</span></li><li class="c4 li-bullet-0"><span class="c7">Secure Data Storage Solutions: Protect data storage with encryption, access controls, and regular security audits.</span></li><li class="c4 li-bullet-0"><span class="c41">Data Audit and Logging:</span><span class="c7"> Track data access and modifications, providing an audit trail for accountability and investigation.</span></li><li class="c4 li-bullet-0"><span class="c41">Data Privacy Controls</span><span class="c7">: Ensure compliance with data protection regulations (like GDPR, CCPA) through anonymization, pseudonymization, and consent management.</span></li><li class="c4 li-bullet-0"><span class="c41">Data Integrity Controls:</span><span class="c7"> Mechanisms to ensure the accuracy and consistency of data throughout its lifecycle, including checksums and validation processes.</span></li><li class="c4 li-bullet-0"><span class="c41">Synthetic Data Generation: </span><span class="c7">generation of synthetic data to avoid PII, unsecure and unlicensed data inclusion.</span></li><li class="c4 li-bullet-0"><span class="c41">Network Security Controls:</span><span class="c7"> Safeguard the network infrastructure with firewalls, VPNs, and intrusion detection/prevention systems to prevent unauthorized data access or transfer.</span></li><li class="c4 li-bullet-0"><span class="c41">Compliance and Governance Controls:</span><span> Policies and procedures that guide data handling practices, ensuring adherence to legal, ethical, and industry standards.</span></li></ul><p class="c2 c11"><span class="c7"></span></p><h3 class="c17 c19" id="h.4539umcc2qpr"><span class="c16">Building</span></h3><p class="c2 c11"><span class="c7"></span></p><p class="c20 c11"><span class="c7">The model building process for Large Language Models (LLMs) and generative AI involves several sequential steps, starting from the initial design to the final training and validation stages. Here’s a brief overview of this process:</span></p><p class="c20 c11 c86"><span class="c7"></span></p><ul class="c34 lst-kix_38eu28mfwsib-0 start"><li class="c20 c58 li-bullet-0"><span class="c41">Design and Architecture:</span><span class="c7"> Defining the model's structure, including the type of neural network, layers, and activation functions, to meet the specified goals..</span></li><li class="c20 c58 li-bullet-0"><span class="c41">Model Training:</span><span class="c7"> Adjusting the model's parameters (weights and biases) using the training dataset through a process of optimization, often involving gradient descent and backpropagation.</span></li><li class="c20 c58 li-bullet-0"><span class="c41">Evaluation and Validation:</span><span class="c7"> Assessing the model's performance on a separate validation dataset to tune hyperparameters and prevent overfitting.</span></li><li class="c20 c58 li-bullet-0"><span class="c41">Testing:</span><span class="c7"> Using a testing dataset to evaluate the model's generalization capability to new, unseen data, ensuring it performs well in real-world scenarios.</span></li></ul><p class="c2 c74"><span class="c7"></span></p><h4 class="c17 c19 c76" id="h.4vnnsoltn19h"><span class="c53">Security Controls and Solutions Specific to Model Building</span></h4><p class="c2 c10"><span class="c7"></span></p><p class="c20 c10"><span class="c7">These security controls are crucial for protecting the integrity of the model building process, ensuring the confidentiality and integrity of the data used, and safeguarding the resulting models from unauthorized access or manipulation.</span></p><p class="c1"><span> </span></p><ul class="c34 lst-kix_sykcwjwuguhv-0 start"><li class="c4 li-bullet-0"><span class="c7">Secure Data Storage and Transmission: Ensuring that data used in training and validation is securely stored and transmitted, employing encryption both at rest and in transit.</span></li><li class="c4 li-bullet-0"><span class="c7">Access Control to Training Environments: Limiting access to model training environments to authorized personnel, using role-based access controls (RBAC) and authentication mechanisms.</span></li><li class="c4 li-bullet-0"><span class="c7">Model Integrity Controls: Implementing measures to ensure the integrity of the model during training, such as checksums and digital signatures, to protect against unauthorized modifications.</span></li><li class="c4 li-bullet-0"><span class="c7">Secure Deployment: Ensuring the environment into which the model is deployed is secure, including the use of container security, secure APIs, and monitoring for anomalous behavior that might indicate a security breach.</span></li><li class="c4 li-bullet-0"><span class="c7">Vulnerability Management: Regularly scanning and updating the software and libraries used in the model building process to protect against known vulnerabilities.</span></li></ul><p class="c2 c11"><span class="c7"></span></p><h3 class="c17 c19" id="h.xxtaufcvij9o"><span class="c16">Provisioning and Serving</span></h3><p class="c2 c11"><span class="c7"></span></p><p class="c20 c11"><span class="c7">The model provisioning and serving process involves deploying trained machine learning models so they can be used to make predictions or analyses on new data in a production environment. This process ensures that the model is accessible and performs optimally under real-world operational conditions.</span></p><p class="c2 c11"><span class="c7"></span></p><ul class="c34 lst-kix_sr0ib5126w3g-0 start"><li class="c3 li-bullet-0"><span class="c7">Model Selection: Choosing the most appropriate model based on performance metrics from the testing phase.</span></li><li class="c3 li-bullet-0"><span class="c7">Environment Setup: Preparing the production environment, which can range from cloud services to on-premises servers, ensuring it meets the required computational needs.</span></li><li class="c3 li-bullet-0"><span class="c7">Model Deployment: Deploying the model to the production environment, making it available for making predictions or analyses on new data.</span></li><li class="c3 li-bullet-0"><span class="c7">Integration: Integrating the model with existing systems, such as web applications or data pipelines, to automate the flow of data in and out of the model.</span></li><li class="c3 li-bullet-0"><span class="c7">Monitoring and Maintenance: Continuously monitoring the model's performance to detect and correct drift, anomalies, or failures, and updating the model as necessary to maintain its accuracy and effectiveness.</span></li></ul><p class="c2"><span class="c7"></span></p><h4 class="c17 c19 c76" id="h.mkesfm8p6nwg"><span class="c53">Security Controls and Solutions Specific to Provisioning and Serving</span></h4><p class="c2 c11"><span class="c7"></span></p><p class="c17 c10"><span class="c7">These security controls are crucial for protecting the integrity of the model building process, ensuring the confidentiality and integrity of the data used, and safeguarding the resulting models from unauthorized access or manipulation.</span></p><p class="c17 c90"><span class="c7"> </span></p><ul class="c34 lst-kix_sykcwjwuguhv-0"><li class="c17 c51 li-bullet-0"><span class="c7">Authentication and Authorization: Implementing strong authentication and authorization mechanisms to control access to the model, ensuring that only authorized users or systems can make predictions or access model outputs.</span></li><li class="c17 c51 li-bullet-0"><span class="c7">Data Encryption: Using encryption for data in transit and at rest, protecting sensitive input data sent to the model and the predictions it generates.</span></li><li class="c17 c51 li-bullet-0"><span class="c7">Secure APIs: Ensuring that any APIs used to interact with the model are secured against common web vulnerabilities, such as SQL injection or cross-site scripting (XSS), and implementing rate limiting to prevent abuse.</span></li><li class="c17 c51 li-bullet-0"><span class="c7">Access Logging and Monitoring: Keeping detailed logs of access to the model and monitoring for unusual patterns that might indicate an attempted breach or abuse.</span></li><li class="c17 c51 li-bullet-0"><span class="c7">Model Tampering Protection: Applying measures to prevent unauthorized changes to the model, including digital signatures and checksums.</span></li><li class="c17 c51 li-bullet-0"><span class="c7">Network Security: Using firewalls, virtual private clouds (VPCs), and other network security measures to isolate the model and protect it from external attacks.</span></li><li class="c17 c51 li-bullet-0"><span class="c7">Data Privacy Compliance: Adhering to data privacy regulations and best practices when handling input data and generating outputs, especially when personal or sensitive information is involved.</span></li><li class="c17 c51 li-bullet-0"><span class="c7">Regular Security Audits: Conducting regular security audits of the model serving environment to identify and remediate potential vulnerabilities.</span></li></ul><p class="c2"><span class="c7"></span></p><h3 class="c17 c19" id="h.hm3rf5w26190"><span class="c16">Observability/Monitoring</span></h3><p class="c2 c11"><span class="c7"></span></p><p class="c20 c11"><span class="c7">The model monitoring and serving process is crucial for maintaining the performance and reliability of machine learning models once they are deployed in production. This process ensures that the models continue to operate as expected over time, providing accurate predictions or analyses even as input data changes. Below is a concise overview of this process, followed by specific security controls pertinent to model monitoring and serving:</span></p><p class="c2 c11"><span class="c7"></span></p><ul class="c34 lst-kix_hiavm9xfuid5-0 start"><li class="c3 li-bullet-0"><span class="c41">Model Serving:</span><span class="c7"> Deploying the model in a production environment where it can receive input data and return predictions or analyses. This includes setting up scalable and accessible infrastructure to handle requests efficiently.</span></li><li class="c3 li-bullet-0"><span class="c41">Performance Monitoring:</span><span class="c7"> Continuously tracking the model's performance metrics to identify any degradation or deviations from expected behavior, such as accuracy, latency, and throughput.</span></li><li class="c3 li-bullet-0"><span class="c41">Data Quality Monitoring:</span><span class="c7"> Observing the quality of input data to detect any anomalies, shifts in data distribution, or new patterns that could affect the model's accuracy.</span></li><li class="c3 li-bullet-0"><span class="c41">Operational Monitoring</span><span class="c7">: Ensuring the infrastructure supporting the model operates smoothly, monitoring for issues like server downtime, high latency, or resource bottlenecks.</span></li><li class="c3 li-bullet-0"><span class="c41">Feedback Loops</span><span class="c7">: Implementing mechanisms for collecting feedback on the model's predictions, which can be used to further refine and improve the model.</span></li><li class="c3 li-bullet-0"><span class="c41">Update and Retraining:</span><span class="c7"> Regularly updating the model with new data or retraining it to adapt to changes in data patterns, ensuring sustained performance over time.</span></li></ul><p class="c2 c74"><span class="c7"></span></p><h4 class="c17 c19 c76" id="h.2wh1tcsvtjfp"><span class="c53">Security Controls and Solutions Specific to Observability and Monitoring</span></h4><p class="c2 c11"><span class="c7"></span></p><p class="c20 c10"><span class="c7">These security controls are crucial for protecting the integrity of the model building process, ensuring the confidentiality and integrity of the data used, and safeguarding the resulting models from unauthorized access or manipulation.</span></p><p class="c1"><span class="c7"> </span></p><ul class="c34 lst-kix_vvup3vgqs6ig-0 start"><li class="c4 li-bullet-0"><span class="c7">Secure Model Access: Employing authentication and authorization to restrict access to the model, ensuring that only authorized users or systems can use it or access its predictions.</span></li><li class="c4 li-bullet-0"><span class="c7">Input and Output Data Encryption: Protecting the confidentiality and integrity of input data and model predictions with encryption, both in transit and at rest.</span></li><li class="c4 li-bullet-0"><span class="c7">API Security: Securing APIs that provide access to the model, implementing measures against attacks such as injection and ensuring that API keys or tokens are managed securely.</span></li><li class="c4 li-bullet-0"><span class="c7">Access and Activity Logging: Keeping detailed logs of all access to the model and its predictions, and monitoring these logs for signs of unauthorized or malicious activity.</span></li><li class="c4 li-bullet-0"><span class="c7">Anomaly Detection: Using anomaly detection systems to monitor for unusual activity that could indicate a security threat, such as attempts to probe the model for vulnerabilities or to extract sensitive data.</span></li><li class="c4 li-bullet-0"><span class="c7">Secure Configuration Management: Ensuring that monitoring systems and their connections to the model and data sources are securely configured to resist tampering and unauthorized access.</span></li></ul><p class="c2 c74"><span class="c7"></span></p><h3 class="c17 c19" id="h.7e7nwihtrtg0"><span class="c16">Consumption</span></h3><p class="c2 c11"><span class="c7"></span></p><p class="c20 c11"><span class="c7">Model consumption and usage refer to the process where deployed machine learning models are utilized by end-users or applications to make predictions, analyze data, or generate insights. This final step in the model lifecycle involves interacting with the model through APIs, applications, or other interfaces to apply the model's capabilities to real-world problems and data. Ensuring secure and efficient access to the model's functionalities is crucial for maintaining data integrity, user privacy, and system reliability.</span></p><p class="c2 c11"><span class="c7"></span></p><ul class="c34 lst-kix_hiavm9xfuid5-0"><li class="c4 li-bullet-0"><span class="c41">Accessing the Model:</span><span class="c7"> Users or applications access the model through APIs, web interfaces, or direct integration into software applications, requesting predictions or analyses based on input data.</span></li><li class="c4 li-bullet-0"><span class="c41">Receiving Predictions</span><span class="c7">: The model processes the input data and returns predictions, analyses, or insights, which can be used to inform decisions, automate processes, or enhance user experiences.</span></li><li class="c4 li-bullet-0"><span class="c41">Interpreting Results:</span><span class="c7"> Users or applications interpret the model's output, integrating these insights into broader decision-making processes, workflows, or user interfaces.</span></li><li class="c4 li-bullet-0"><span class="c41">Feedback and Improvement:</span><span class="c7"> Feedback on the model's predictions may be collected for future improvements, either to refine the model itself or to adjust how its outputs are used.</span></li></ul><p class="c20 c86 c74"><span class="c7"></span></p><h4 class="c17 c19 c76" id="h.7kx5p3mhror5"><span class="c53">Security Controls and Solutions Specific to Model Consumption</span></h4><p class="c2 c11"><span class="c7"></span></p><p class="c10 c20"><span class="c7">By implementing these security controls, organizations can ensure that the consumption and usage of machine learning models are secure, protecting both the integrity of the model and the privacy and security of user data. This approach fosters trust and reliability in AI systems, enabling their effective use in a wide range of applications.</span></p><p class="c1"><span class="c7"> </span></p><ul class="c34 lst-kix_vvup3vgqs6ig-0"><li class="c4 li-bullet-0"><span class="c41">Authentication and Access Control:</span><span class="c7"> Implement strong authentication mechanisms and fine-grained access controls to ensure that only authorized users or systems can access the model and its predictions.</span></li><li class="c4 li-bullet-0"><span class="c41">Data Encryption:</span><span class="c7"> Encrypt sensitive input data sent to the model and the predictions returned to the user, both in transit and at rest, to protect against data breaches and eavesdropping.</span></li><li class="c4 li-bullet-0"><span class="c41">LLM Firewalls:</span><span class="c7"> act as a security layer to monitor and control the input/output data flow to and from an LLM, ensuring only appropriate content is processed or generated. They can prevent malicious inputs designed to exploit the model or elicit unauthorized data, using predefined rules or dynamic analysis to detect and block potential threats.</span></li><li class="c4 li-bullet-0"><span class="c41">Secure API Usage:</span><span class="c7"> Secure the APIs through which the model is accessed, using HTTPS, API keys, and tokens to safeguard against unauthorized access and ensure data integrity.</span></li><li class="c4 li-bullet-0"><span class="c41">Rate Limiting and Throttling:</span><span class="c7"> Implement rate limiting and throttling on model access to prevent abuse and ensure the model remains available to legitimate users.</span></li><li class="c4 li-bullet-0"><span class="c41">Input Validation</span><span class="c7">: Validate input data to prevent injection attacks or attempts to probe the model with malicious data, ensuring that only legitimate requests are processed.</span></li><li class="c4 li-bullet-0"><span class="c41">Anomaly Detection</span><span class="c7">: Continuously monitor access patterns and model usage for signs of unusual or unauthorized activity, employing anomaly detection systems to identify potential security threats.</span></li></ul><h3 class="c17 c19 c46" id="h.6byecoje9tj6"><span class="c16"></span></h3><h3 class="c17 c19" id="h.e9ej6jl8zu96"><span class="c16">Ethical and Compliance Governance</span></h3><p class="c2 c11"><span class="c7"></span></p><p class="c20 c11"><span class="c7">Model governance and compliance ethics encompass the frameworks, policies, and processes that ensure machine learning models are developed, deployed, and maintained responsibly, transparently, and in accordance with ethical standards, legal regulations, and industry best practices. This includes considerations around data privacy, model fairness, accountability, transparency, and the mitigation of biases, aiming to foster trust and reliability in AI systems while protecting individuals and society from potential harms.</span></p><p class="c2 c11"><span class="c7"></span></p><ul class="c34 lst-kix_sr0ib5126w3g-0"><li class="c3 li-bullet-0"><span class="c7">Policy Development and Implementation: Establishing clear policies that outline ethical considerations, compliance requirements, and governance structures for the lifecycle of AI models.</span></li><li class="c3 li-bullet-0"><span class="c7">Ethical Review and Assessment: Conducting thorough reviews and assessments of models to identify and mitigate ethical risks, biases, and potential unintended consequences.</span></li><li class="c3 li-bullet-0"><span class="c7">Compliance with Regulations: Ensuring that model development and deployment comply with all relevant data protection and privacy laws (e.g., GDPR, CCPA), as well as industry-specific regulations.</span></li><li class="c3 li-bullet-0"><span class="c7">Transparency and Explainability: Implementing mechanisms to enhance the transparency of model decisions and making them understandable to end-users, thus promoting accountability.</span></li><li class="c3 li-bullet-0"><span class="c7">Stakeholder Engagement: Involving a diverse group of stakeholders in the governance process to consider a broad spectrum of perspectives and values.</span></li></ul><p class="c20 c86 c74"><span class="c7"></span></p><h4 class="c17 c19 c76" id="h.bbla0iv8oa9o"><span class="c53">Security Controls and Solutions Specific to Ethical Compliance Governance</span></h4><p class="c2 c11"><span class="c7"></span></p><p class="c20 c10"><span class="c7">By implementing these security controls, organizations can ensure that the consumption and usage of machine learning models are secure, protecting both the integrity of the model and the privacy and security of user data. This approach fosters trust and reliability in AI systems, enabling their effective use in a wide range of applications.</span></p><p class="c1"><span class="c7"> </span></p><ul class="c34 lst-kix_vvup3vgqs6ig-0"><li class="c4 li-bullet-0"><span class="c7">Data Protection and Privacy Controls: Implementing strict data handling procedures, including data anonymization, encryption, and secure data storage, to protect personal and sensitive information.</span></li><li class="c4 li-bullet-0"><span class="c7">Access Control and Authentication Mechanisms: Ensuring that access to data and AI models is tightly controlled through robust authentication and authorization practices to prevent unauthorized access and ensure accountability.</span></li><li class="c4 li-bullet-0"><span class="c7">Audit Trails and Activity Monitoring: Keeping detailed logs of all activities related to the model, including data access, model training, and deployment actions, to provide transparency and support audits.</span></li><li class="c4 li-bullet-0"><span class="c7">Bias Detection and Mitigation Tools: Utilizing advanced analytical tools to regularly assess and mitigate biases in models, promoting fairness and reducing the risk of discrimination.</span></li><li class="c4 li-bullet-0"><span class="c7">Regular Compliance Audits: Conducting periodic audits to ensure ongoing compliance with all relevant laws, regulations, and ethical guidelines, including third-party assessments for independent validation.</span></li><li class="c4 li-bullet-0"><span class="c7">Incident Response and Reporting Mechanisms: Establishing protocols for responding to ethical breaches or compliance violations, including clear channels for reporting concerns and mechanisms for remediation.</span></li><li class="c4 li-bullet-0"><span>Continuous Education and Training: Providing regular training for all personnel involved in the development and deployment of AI models on the latest ethical guidelines, governance frameworks, and compliance requirements.</span><hr style="page-break-before:always;display:none;"></li><li class="c17 c51 li-bullet-0"><span style="overflow: hidden; display: inline-block; margin: 0.00px 0.00px; border: 0.00px solid #000000; transform: rotate(0.00rad) translateZ(0px); -webkit-transform: rotate(0.00rad) translateZ(0px); width: 821.00px; height: 984.00px;"><img alt="" src="images/image3.png" style="width: 821.00px; height: 984.00px; margin-left: 0.00px; margin-top: 0.00px; transform: rotate(0.00rad) translateZ(0px); -webkit-transform: rotate(0.00rad) translateZ(0px);" title=""></span></li></ul><h1 class="c67 c35 c71 c11" id="h.6ln1ueaud5t0"><span class="c48">OWASP LLM and Generative AI CyberSecurity <br>Ecosystem Solution Maps</span></h1><p class="c2 c11"><span class="c7"></span></p><h3 class="c17 c19" id="h.ur97bzrzlko"><span class="c16">OPEN SOURCE</span></h3><p class="c11 c50"><span class="c7"></span></p><a id="t.c852f7b4018b412bd6b72338e249bebd6179a471"></a><a id="t.2"></a><table class="c24 c89"><tr class="c60"><td class="c55 c73" colspan="1" rowspan="1"><p class="c36"><span class="c88">Model Lifecycle Stages</span></p></td><td class="c73 c110" colspan="2" rowspan="1"><p class="c67"><span class="c88">Security Solutions</span></p></td></tr><tr class="c29"><td class="c55 c45" colspan="1" rowspan="1"><p class="c36"><span class="c15">Ethical and Compliance Governance</span></p></td><td class="c68 c45" colspan="1" rowspan="1"><p class="c26"><span class="c7"></span></p></td><td class="c22" colspan="1" rowspan="1"><p class="c26"><span class="c7"></span></p></td></tr><tr class="c29"><td class="c55 c45" colspan="1" rowspan="1"><p class="c36"><span class="c15">Consumption</span></p></td><td class="c68 c45" colspan="1" rowspan="1"><p class="c26"><span class="c7"></span></p></td><td class="c22" colspan="1" rowspan="1"><p class="c26"><span class="c7"></span></p></td></tr><tr class="c29"><td class="c55 c45" colspan="1" rowspan="1"><p class="c36"><span class="c15">Observability/Monitoring</span></p></td><td class="c68 c45" colspan="1" rowspan="1"><p class="c26"><span class="c7"></span></p></td><td class="c22" colspan="1" rowspan="1"><p class="c26"><span class="c7"></span></p></td></tr><tr class="c29"><td class="c55 c45" colspan="1" rowspan="1"><p class="c36"><span class="c15">Serving and Deployment</span></p></td><td class="c68 c45" colspan="1" rowspan="1"><p class="c26"><span class="c7"></span></p></td><td class="c22" colspan="1" rowspan="1"><p class="c26"><span class="c7"></span></p></td></tr><tr class="c29"><td class="c45 c55" colspan="1" rowspan="1"><p class="c36"><span class="c15">Building</span></p></td><td class="c68 c45" colspan="1" rowspan="1"><p class="c26"><span class="c7"></span></p></td><td class="c22" colspan="1" rowspan="1"><p class="c26"><span class="c7"></span></p></td></tr><tr class="c29"><td class="c55 c45" colspan="1" rowspan="1"><p class="c36"><span class="c15">Data Preparation</span></p></td><td class="c45 c68" colspan="1" rowspan="1"><p class="c26"><span class="c7"></span></p></td><td class="c22" colspan="1" rowspan="1"><p class="c26"><span class="c7"></span></p></td></tr></table><p class="c2 c11"><span class="c7"></span></p><p class="c2 c11"><span class="c7"></span></p><h3 class="c17 c19" id="h.42f8rjt1j8h5"><span class="c16">COMMERCIAL</span></h3><p class="c2 c11"><span class="c7"></span></p><a id="t.c852f7b4018b412bd6b72338e249bebd6179a471"></a><a id="t.3"></a><table class="c24 c96"><tr class="c60"><td class="c61" colspan="1" rowspan="1"><p class="c36"><span class="c88">Model Lifecycle Stages</span></p></td><td class="c73 c101" colspan="2" rowspan="1"><p class="c67"><span class="c88">Security Solutions</span></p></td></tr><tr class="c29"><td class="c43" colspan="1" rowspan="1"><p class="c36"><span class="c15">Ethical and Compliance Governance</span></p></td><td class="c23 c45" colspan="1" rowspan="1"><p class="c26"><span class="c7"></span></p></td><td class="c57 c45" colspan="1" rowspan="1"><p class="c26"><span class="c7"></span></p></td></tr><tr class="c29"><td class="c43" colspan="1" rowspan="1"><p class="c36"><span class="c15">Consumption</span></p></td><td class="c23 c45" colspan="1" rowspan="1"><p class="c26"><span class="c7"></span></p></td><td class="c45 c57" colspan="1" rowspan="1"><p class="c26"><span class="c7"></span></p></td></tr><tr class="c29"><td class="c43" colspan="1" rowspan="1"><p class="c36"><span class="c15">Observability/Monitoring</span></p></td><td class="c23 c45" colspan="1" rowspan="1"><p class="c26"><span class="c7"></span></p></td><td class="c57 c45" colspan="1" rowspan="1"><p class="c26"><span class="c7"></span></p></td></tr><tr class="c29"><td class="c43" colspan="1" rowspan="1"><p class="c36"><span class="c15">Serving and Deployment</span></p></td><td class="c23 c45" colspan="1" rowspan="1"><p class="c26"><span class="c7"></span></p></td><td class="c57 c45" colspan="1" rowspan="1"><p class="c26"><span class="c7"></span></p></td></tr><tr class="c29"><td class="c43" colspan="1" rowspan="1"><p class="c36"><span class="c15">Building</span></p></td><td class="c23 c45" colspan="1" rowspan="1"><p class="c26"><span class="c7"></span></p></td><td class="c57 c45" colspan="1" rowspan="1"><p class="c26"><span class="c7"></span></p></td></tr><tr class="c29"><td class="c43" colspan="1" rowspan="1"><p class="c36"><span class="c15">Data Preparation</span></p></td><td class="c23 c45" colspan="1" rowspan="1"><p class="c26"><span class="c7"></span></p></td><td class="c57 c45" colspan="1" rowspan="1"><p class="c26"><span class="c7"></span></p></td></tr></table><p class="c2 c11"><span class="c7"></span></p><hr style="page-break-before:always;display:none;"><h1 class="c67 c35 c71 c11 c60" id="h.98vyz0x919ku"><span class="c48"></span></h1><h1 class="c56" id="h.5z51d2e1q4nk"><span class="c81">Top 10 for LLM Solution </span><span class="c48">Details</span></h1><h2 class="c56" id="h.k0xljaeqq1fe"><span>Open Source</span></h2><h3 class="c6" id="h.emnqjz1y4em4"><span class="c16">Ethical and Compliance Governance</span></h3><a id="t.671c94589e268567c4d9247b25986fca9064d48f"></a><a id="t.4"></a><table class="c24 c63"><tr class="c9"><td class="c18 c27" colspan="1" rowspan="1"><p class="c17"><span class="c14">Company, Tool Name</span></p></td><td class="c8 c27" colspan="1" rowspan="1"><p class="c17"><span class="c14">Description</span></p></td><td class="c13 c27" colspan="1" rowspan="1"><p class="c17"><span class="c14">Top 10 For LLM Coverage</span></p></td></tr><tr class="c32"><td class="c18" colspan="1" rowspan="1"><p class="c17"><span>Placeholder</span></p></td><td class="c8" colspan="1" rowspan="1"><p class="c17"><span>Placeholder</span><span class="c7">.</span></p></td><td class="c13" colspan="1" rowspan="1"><p class="c17"><span class="c7">LLM01, LLM04</span></p></td></tr><tr class="c49"><td class="c18" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td><td class="c8" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td><td class="c13" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td></tr><tr class="c49"><td class="c18" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td><td class="c8" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td><td class="c13" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td></tr><tr class="c49"><td class="c18" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td><td class="c8" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td><td class="c13" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td></tr></table><p class="c2 c90"><span class="c7"></span></p><h3 class="c6" id="h.s3wnmfubrdl6"><span>Consumption</span></h3><a id="t.671c94589e268567c4d9247b25986fca9064d48f"></a><a id="t.5"></a><table class="c24 c63"><tr class="c9"><td class="c18 c27" colspan="1" rowspan="1"><p class="c17"><span class="c14">Company, Tool Name</span></p></td><td class="c8 c27" colspan="1" rowspan="1"><p class="c17"><span class="c14">Description</span></p></td><td class="c13 c27" colspan="1" rowspan="1"><p class="c17"><span class="c14">Top 10 For LLM Coverage</span></p></td></tr><tr class="c32"><td class="c18" colspan="1" rowspan="1"><p class="c17"><span class="c7">Placeholder</span></p></td><td class="c8" colspan="1" rowspan="1"><p class="c17"><span class="c7">Placeholder.</span></p></td><td class="c13" colspan="1" rowspan="1"><p class="c17"><span class="c7">LLM01, LLM04</span></p></td></tr><tr class="c49"><td class="c18" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td><td class="c8" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td><td class="c13" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td></tr><tr class="c49"><td class="c18" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td><td class="c8" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td><td class="c13" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td></tr><tr class="c49"><td class="c18" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td><td class="c8" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td><td class="c13" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td></tr></table><h3 class="c6 c46" id="h.kdtmywfvlp3v"><span class="c16"></span></h3><h3 class="c6" id="h.v6beoad5o573"><span class="c16">Observability/Monitoring</span></h3><a id="t.671c94589e268567c4d9247b25986fca9064d48f"></a><a id="t.6"></a><table class="c24 c63"><tr class="c9"><td class="c18 c27" colspan="1" rowspan="1"><p class="c17"><span class="c14">Company, Tool Name</span></p></td><td class="c8 c27" colspan="1" rowspan="1"><p class="c17"><span class="c14">Description</span></p></td><td class="c13 c27" colspan="1" rowspan="1"><p class="c17"><span class="c14">Top 10 For LLM Coverage</span></p></td></tr><tr class="c32"><td class="c18" colspan="1" rowspan="1"><p class="c17"><span class="c7">Placeholder</span></p></td><td class="c8" colspan="1" rowspan="1"><p class="c17"><span class="c7">Placeholder.</span></p></td><td class="c13" colspan="1" rowspan="1"><p class="c17"><span class="c7">LLM01, LLM04</span></p></td></tr><tr class="c49"><td class="c18" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td><td class="c8" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td><td class="c13" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td></tr><tr class="c49"><td class="c18" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td><td class="c8" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td><td class="c13" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td></tr><tr class="c49"><td class="c18" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td><td class="c8" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td><td class="c13" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td></tr></table><h3 class="c6 c46" id="h.1lpn92wp4xsr"><span class="c16"></span></h3><h3 class="c6" id="h.3ulf1bjyepq6"><span class="c16">Serving and Deployment</span></h3><a id="t.671c94589e268567c4d9247b25986fca9064d48f"></a><a id="t.7"></a><table class="c24 c63"><tr class="c9"><td class="c18 c27" colspan="1" rowspan="1"><p class="c17"><span class="c14">Company, Tool Name</span></p></td><td class="c8 c27" colspan="1" rowspan="1"><p class="c17"><span class="c14">Description</span></p></td><td class="c13 c27" colspan="1" rowspan="1"><p class="c17"><span class="c14">Top 10 For LLM Coverage</span></p></td></tr><tr class="c32"><td class="c18" colspan="1" rowspan="1"><p class="c17"><span class="c7">Placeholder</span></p></td><td class="c8" colspan="1" rowspan="1"><p class="c17"><span class="c7">Placeholder.</span></p></td><td class="c13" colspan="1" rowspan="1"><p class="c17"><span class="c7">LLM01, LLM04</span></p></td></tr><tr class="c49"><td class="c18" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td><td class="c8" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td><td class="c13" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td></tr><tr class="c49"><td class="c18" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td><td class="c8" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td><td class="c13" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td></tr><tr class="c49"><td class="c18" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td><td class="c8" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td><td class="c13" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td></tr></table><h3 class="c6 c46" id="h.4a54ef3jwg51"><span class="c16"></span></h3><h3 class="c6" id="h.xl4h3wk5bu1g"><span class="c16">Building</span></h3><a id="t.671c94589e268567c4d9247b25986fca9064d48f"></a><a id="t.8"></a><table class="c24 c63"><tr class="c9"><td class="c18 c27" colspan="1" rowspan="1"><p class="c17"><span class="c14">Company, Tool Name</span></p></td><td class="c8 c27" colspan="1" rowspan="1"><p class="c17"><span class="c14">Description</span></p></td><td class="c13 c27" colspan="1" rowspan="1"><p class="c17"><span class="c14">Top 10 For LLM Coverage</span></p></td></tr><tr class="c32"><td class="c18" colspan="1" rowspan="1"><p class="c17"><span class="c7">Placeholder</span></p></td><td class="c8" colspan="1" rowspan="1"><p class="c17"><span class="c7">Placeholder.</span></p></td><td class="c13" colspan="1" rowspan="1"><p class="c17"><span class="c7">LLM01, LLM04</span></p></td></tr><tr class="c49"><td class="c18" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td><td class="c8" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td><td class="c13" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td></tr><tr class="c49"><td class="c18" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td><td class="c8" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td><td class="c13" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td></tr><tr class="c49"><td class="c18" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td><td class="c8" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td><td class="c13" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td></tr></table><h3 class="c6" id="h.fc1wxbe8pruj"><span class="c16">Data Preparation </span></h3><a id="t.671c94589e268567c4d9247b25986fca9064d48f"></a><a id="t.9"></a><table class="c24 c63"><tr class="c9"><td class="c18 c27" colspan="1" rowspan="1"><p class="c17"><span class="c14">Company, Tool Name</span></p></td><td class="c8 c27" colspan="1" rowspan="1"><p class="c17"><span class="c14">Description</span></p></td><td class="c13 c27" colspan="1" rowspan="1"><p class="c17"><span class="c14">Top 10 For LLM Coverage</span></p></td></tr><tr class="c32"><td class="c18" colspan="1" rowspan="1"><p class="c17"><span class="c7">Placeholder</span></p></td><td class="c8" colspan="1" rowspan="1"><p class="c17"><span class="c7">Placeholder.</span></p></td><td class="c13" colspan="1" rowspan="1"><p class="c17"><span class="c7">LLM01, LLM04</span></p></td></tr><tr class="c49"><td class="c18" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td><td class="c8" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td><td class="c13" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td></tr><tr class="c49"><td class="c18" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td><td class="c8" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td><td class="c13" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td></tr><tr class="c49"><td class="c18" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td><td class="c8" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td><td class="c13" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td></tr></table><hr style="page-break-before:always;display:none;"><p class="c2 c70"><span class="c98"></span></p><h1 class="c56" id="h.ba3smqf8lm2c"><span class="c48">Top 10 for LLM Solution Details<br>Commercial</span></h1><p class="c2 c11"><span class="c7"></span></p><h3 class="c6" id="h.nhn7r245yjvj"><span class="c16">Ethical and Compliance Governance</span></h3><a id="t.671c94589e268567c4d9247b25986fca9064d48f"></a><a id="t.10"></a><table class="c24 c63"><tr class="c9"><td class="c18 c27" colspan="1" rowspan="1"><p class="c17"><span class="c14">Company, Tool Name</span></p></td><td class="c8 c27" colspan="1" rowspan="1"><p class="c17"><span class="c14">Description</span></p></td><td class="c13 c27" colspan="1" rowspan="1"><p class="c17"><span class="c14">Top 10 For LLM Coverage</span></p></td></tr><tr class="c32"><td class="c18" colspan="1" rowspan="1"><p class="c17"><span class="c7">Placeholder</span></p></td><td class="c8" colspan="1" rowspan="1"><p class="c17"><span class="c7">Placeholder.</span></p></td><td class="c13" colspan="1" rowspan="1"><p class="c17"><span class="c7">LLM01, LLM04</span></p></td></tr><tr class="c49"><td class="c18" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td><td class="c8" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td><td class="c13" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td></tr><tr class="c49"><td class="c18" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td><td class="c8" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td><td class="c13" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td></tr><tr class="c49"><td class="c18" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td><td class="c8" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td><td class="c13" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td></tr></table><p class="c2 c90"><span class="c7"></span></p><h3 class="c6" id="h.2y2el4kq174d"><span class="c16">Consumption</span></h3><a id="t.671c94589e268567c4d9247b25986fca9064d48f"></a><a id="t.11"></a><table class="c24 c63"><tr class="c9"><td class="c18 c27" colspan="1" rowspan="1"><p class="c17"><span class="c14">Company, Tool Name</span></p></td><td class="c8 c27" colspan="1" rowspan="1"><p class="c17"><span class="c14">Description</span></p></td><td class="c13 c27" colspan="1" rowspan="1"><p class="c17"><span class="c14">Top 10 For LLM Coverage</span></p></td></tr><tr class="c32"><td class="c18" colspan="1" rowspan="1"><p class="c17"><span class="c7">Placeholder</span></p></td><td class="c8" colspan="1" rowspan="1"><p class="c17"><span class="c7">Placeholder.</span></p></td><td class="c13" colspan="1" rowspan="1"><p class="c17"><span class="c7">LLM01, LLM04</span></p></td></tr><tr class="c49"><td class="c18" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td><td class="c8" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td><td class="c13" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td></tr><tr class="c49"><td class="c18" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td><td class="c8" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td><td class="c13" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td></tr><tr class="c49"><td class="c18" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td><td class="c8" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td><td class="c13" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td></tr></table><h3 class="c6 c46" id="h.kz8r1pxoc5yb"><span class="c16"></span></h3><h3 class="c6" id="h.wbtpiuj556bl"><span class="c16">Observability/Monitoring</span></h3><a id="t.671c94589e268567c4d9247b25986fca9064d48f"></a><a id="t.12"></a><table class="c24 c63"><tr class="c9"><td class="c18 c27" colspan="1" rowspan="1"><p class="c17"><span class="c14">Company, Tool Name</span></p></td><td class="c8 c27" colspan="1" rowspan="1"><p class="c17"><span class="c14">Description</span></p></td><td class="c13 c27" colspan="1" rowspan="1"><p class="c17"><span class="c14">Top 10 For LLM Coverage</span></p></td></tr><tr class="c32"><td class="c18" colspan="1" rowspan="1"><p class="c17"><span class="c7">Placeholder</span></p></td><td class="c8" colspan="1" rowspan="1"><p class="c17"><span class="c7">Placeholder.</span></p></td><td class="c13" colspan="1" rowspan="1"><p class="c17"><span class="c7">LLM01, LLM04</span></p></td></tr><tr class="c49"><td class="c18" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td><td class="c8" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td><td class="c13" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td></tr><tr class="c49"><td class="c18" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td><td class="c8" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td><td class="c13" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td></tr><tr class="c49"><td class="c18" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td><td class="c8" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td><td class="c13" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td></tr></table><h3 class="c6 c46" id="h.c580ctat0bb6"><span class="c16"></span></h3><h3 class="c6" id="h.tt4saex4112g"><span class="c16">Serving and Deployment</span></h3><a id="t.671c94589e268567c4d9247b25986fca9064d48f"></a><a id="t.13"></a><table class="c24 c63"><tr class="c9"><td class="c18 c27" colspan="1" rowspan="1"><p class="c17"><span class="c14">Company, Tool Name</span></p></td><td class="c8 c27" colspan="1" rowspan="1"><p class="c17"><span class="c14">Description</span></p></td><td class="c13 c27" colspan="1" rowspan="1"><p class="c17"><span class="c14">Top 10 For LLM Coverage</span></p></td></tr><tr class="c32"><td class="c18" colspan="1" rowspan="1"><p class="c17"><span class="c7">Placeholder</span></p></td><td class="c8" colspan="1" rowspan="1"><p class="c17"><span class="c7">Placeholder.</span></p></td><td class="c13" colspan="1" rowspan="1"><p class="c17"><span class="c7">LLM01, LLM04</span></p></td></tr><tr class="c49"><td class="c18" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td><td class="c8" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td><td class="c13" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td></tr><tr class="c49"><td class="c18" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td><td class="c8" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td><td class="c13" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td></tr><tr class="c49"><td class="c18" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td><td class="c8" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td><td class="c13" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td></tr></table><h3 class="c6 c46" id="h.o5lraki5rtox"><span class="c16"></span></h3><h3 class="c6" id="h.8l3krvjbcbtz"><span class="c16">Building</span></h3><a id="t.671c94589e268567c4d9247b25986fca9064d48f"></a><a id="t.14"></a><table class="c24 c63"><tr class="c9"><td class="c18 c27" colspan="1" rowspan="1"><p class="c17"><span class="c14">Company, Tool Name</span></p></td><td class="c8 c27" colspan="1" rowspan="1"><p class="c17"><span class="c14">Description</span></p></td><td class="c13 c27" colspan="1" rowspan="1"><p class="c17"><span class="c14">Top 10 For LLM Coverage</span></p></td></tr><tr class="c32"><td class="c18" colspan="1" rowspan="1"><p class="c17"><span class="c7">Placeholder</span></p></td><td class="c8" colspan="1" rowspan="1"><p class="c17"><span class="c7">Placeholder.</span></p></td><td class="c13" colspan="1" rowspan="1"><p class="c17"><span class="c7">LLM01, LLM04</span></p></td></tr><tr class="c49"><td class="c18" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td><td class="c8" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td><td class="c13" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td></tr><tr class="c49"><td class="c18" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td><td class="c8" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td><td class="c13" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td></tr><tr class="c49"><td class="c18" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td><td class="c8" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td><td class="c13" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td></tr></table><h3 class="c6" id="h.7stsvoep6cjt"><span class="c16">Data Preparation</span></h3><a id="t.671c94589e268567c4d9247b25986fca9064d48f"></a><a id="t.15"></a><table class="c24 c63"><tr class="c9"><td class="c18 c27" colspan="1" rowspan="1"><p class="c17"><span class="c14">Company, Tool Name</span></p></td><td class="c8 c27" colspan="1" rowspan="1"><p class="c17"><span class="c14">Description</span></p></td><td class="c13 c27" colspan="1" rowspan="1"><p class="c17"><span class="c14">Top 10 For LLM Coverage</span></p></td></tr><tr class="c32"><td class="c18" colspan="1" rowspan="1"><p class="c17"><span class="c7">Placeholder</span></p></td><td class="c8" colspan="1" rowspan="1"><p class="c17"><span class="c7">Placeholder.</span></p></td><td class="c13" colspan="1" rowspan="1"><p class="c17"><span class="c7">LLM01, LLM04</span></p></td></tr><tr class="c49"><td class="c18" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td><td class="c8" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td><td class="c13" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td></tr><tr class="c49"><td class="c18" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td><td class="c8" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td><td class="c13" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td></tr><tr class="c49"><td class="c18" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td><td class="c8" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td><td class="c13" colspan="1" rowspan="1"><p class="c2"><span class="c7"></span></p></td></tr></table><hr style="page-break-before:always;display:none;"><h1 class="c67 c35 c71 c11 c60" id="h.fk8t6gjalewu"><span class="c48"></span></h1><h1 class="c67 c35 c11 c71" id="h.dgzsiefrwk22"><span class="c48">OWASP Top 10 for LLM Project Supporters</span></h1><p class="c2 c11"><span class="c7"></span></p><p class="c2 c11"><span class="c7"></span></p><hr style="page-break-before:always;display:none;"><h1 class="c67 c35 c71 c11 c60" id="h.2w80lybnwun1"><span class="c48"></span></h1><h1 class="c67 c35 c71 c11" id="h.2o4oxv90v53b"><span class="c48">OWASP Top 10 for LLM Project Contributors</span></h1><p class="c2 c11"><span class="c7"></span></p><p class="c2 c11 c76"><span class="c81 c107"></span></p><div><p class="c17 c64"><span>Version: 0.1 </span></p></div></body></html>