OWASP Top 10 for LLM Applications: Risks and Mitigation

Version 2025

Explore Risks
User
2579
Application
Application
×
  • API Calls to Model
  • Prompt Handling
  • RAG and Context Calls
1310
Model
Model Endpoint
×
  • Model
34
Training
Training Data Assets
×
  • Training Data
  • Validation Data
  • Test Data
389
RAG
RAG* Data Assets
×
  • Vector DB
  • Embeddings
  • * Retrieval augmented generation
36
Tools
Tools
×
  • API
  • Plugin
1
1
2
2
12
2
2

Get to Know the Palo Alto Networks Cloud Security Toolkit

AI Security Posture Management

Visualize AI deployments and prevent risky misconfigurations

Ai SPM

AI Runtime Security

Prevent data leakage and attacks against models in production

Ai Runtime Security

Cloud AI Detection and Response

Stop attacks on AI pipelines in real-time

Data Security Posture Management

Detect and classify sensitive data to prioritize risk

Cloud Infrastructure icon

Cloud Infrastructure Entitlement Management

Monitor permissions and enforce least privilege access

Application Security

Surface vulnerabilities in open source packages