OG¶«·½ÌüMAFÖ±ÃæOWASP LLM Top10Íþвȫ¾°
°ä²¼¹¦·ò 2025-02-21"ÈÃÿһ¾äÈË»ú¶Ô»°¶¼°²È«¿ÉÐÅ£¬£¬£¬ÈÃÿһ´ÎÖÇÄܽ»»¥¶¼·çÏտɿءª¡ªÕâÊÇÊôÓÚAIʱÆÚµÄ°²È«³Ðŵ¡£¡£¡£ ¡ª¡ª OG¶«·½Ìü"
ý½é£º£º£º
°²È«Íþвͼ¼ø
OWASPµÄ¡¶´ó¹æÄ£Ëµ»°Ä£ÐÍÀûÓà Top 10¡·ÏîĿʼÓÚ2023Ä꣬£¬£¬Ö¼ÔÚ͹Æð²¢½â¾öÓëÈËΪÖÇÄÜÀûÓÃÓйصݲȫÎÊÌâ¡£¡£¡£2025Äê¸üеİ汾¶ÔÏÖÓзçÏÕÓÐÁ˸üÉîµµ´ÎÀí½â£¬£¬£¬²¢ÄÉÈëÁËLLMÔÚÏÖʵÀûÓÃÖеÄ×îÐÂÖØÒª½øÕ¹¡£¡£¡£ÈçÏÂͼ£º£º£º

Ò»¡¢¡¢ÑµÁ·Êý¾Ý²ã·çÏÕ
1.ѵÁ·Êý¾ÝͶ¶¾¹¥»÷ (Training Data Poisoning Exploitation)
¶ÔѵÁ·Êý¾Ý½øÐжñÒâ×ÌÈÅ»ò´Û¸Ä£¬£¬£¬µ¼ÖÂÄ£ÐÍѧϰÃýÎóµÄģʽ£¬£¬£¬Ó°ÏìÄ£Ð͵ĻúÄܺÍÕýÈ·ÐÔ¡£¡£¡£
2.¹ý¶ÈÒÀÀµ (Excessive Feature Dependency)
Ä£ÐÍÔÚÄ³Ð©ÌØµãÉÏ´æÔÚ¹ý¶ÈÒÀÀµ£¬£¬£¬µ¼ÖÂÆä¶ÔÒì³£ÊäÈë»ò¹¥»÷²û·¢³ö´àÈõÐÔ¡£¡£¡£
3.ÏòÁ¿ÓëǶÈëÈõµã (Embedding and Vector Representation Vulnerabilities)
Ä£Ð͵ÄǶÈëÏòÁ¿»òÊý¾Ý±íÕ÷´æÔÚÈõµã£¬£¬£¬¹¥»÷Õß¿ÉÄÜÀûÓÃÕâЩÈõµã½øÐÐDZÔڵĹ¥»÷¡£¡£¡£
4.ÐéαÐÅÏ¢ (Misinformation Dissemination)
Ä£ÐÍÌìÉúµÄÐÅÏ¢²»ÕýÈ·»òÐéᣬ£¬£¬µ¼ÖÂÎóµ¼Óû§»òÔì³ÉÉç»áºÍ°²È«ÎÊÌâ¡£¡£¡£
5.²»°²È«²å¼þ£¨Insecure Plugins£©
¼¯³ÉµÄÍⲿ²å¼þ»òÄ£¿£¿£¿é´æÔÚ·ì϶£¬£¬£¬¿ÉÄÜΪ¹¥»÷ÕßÌṩδÊÚȨ½Ó¼û»òÖ´ÐжñÒâ²Ù×÷µÄõè¾¶¡£¡£¡£
¶þ¡¢¡¢ÊäÈë²ã°²È«·çÏÕ
1.ÌáÐÑ×¢Èë¹¥»÷£¨Prompt Injection£©
¹¥»÷Õßͨ¹ý»ú¹ØÆ¥µÐÐÔÌáÐÑ´ÊÍ»ÆÆÏµÍ³Ô¤ÉèÖ¸Á£¬£¬ÓÕµ¼Ä£ÐÍŤתÆäÐÐΪ»òÊä³ö¡£¡£¡£
2.Ä£ÐÍÔ½Óü·çÏÕ£¨Model Jailbreaking£©
Ô½ÓüÊÇÒ»ÖÖÌØÊâµÄÌáÐÑ×¢È룬£¬£¬¹¥»÷ÕßÌṩÊäÈ룬£¬£¬µ¼ÖÂÄ£ÐÍÆëÈ«ºöÊÓÆäÒÑÓеݲȫºÍ̸¡£¡£¡£
3.¹ý¶È´úÀí·çÏÕ (Excessive Proxying Risks)
LLM À©´ó±ÉÈËÓÎϵͳÉÏÕ¼Óг¬³öÀûÓ÷¨Ê½Ô¤ÆÚ²Ù×÷ËùÐèµÄȨÏÞ£¬£¬£¬ÀýÈçÒ»¸ö±¾Ó¦Ö»¶ÁÈ¡Êý¾ÝµÄÀ©´óʹÓõÄÕË»§²»½öÕ¼ÓÐ SELECT ȨÏÞ£¬£¬£¬»¹Õ¼ÓÐ UPDATE¡¢¡¢INSERT ºÍ DELETE ȨÏÞ£¬£¬£¬¿ÉÄÜÏνӵ½Êý¾Ý¿â·þÎñÆ÷¡£¡£¡£
Èý¡¢¡¢Êä³ö²ã°²È«·çÏÕ
1.Ãô¸ÐÐÅϢй¶£¨Sensitive Information Disclosure£©
Ä£ÐÍÔÚÎÞÒâÖÐÌìÉúÊä³ö£¬£¬£¬Ð¹Â¶Ãô¸Ð»ò»úÃÜÊý¾Ý£¬£¬£¬µ¼ÖÂÒþÖÔй¶ºÍÐÅÏ¢°²È«ÎÊÌâ¡£¡£¡£
2.ϵͳÌáÐÑй¶£¨System Prompt Leak£©
¹¥»÷Õßͨ¹ýÄæÏò¹¤³Ì»òÆäËû¼¿Á©»ñȡģÐ͵ÄÄÚ²¿ÌáÐÑÐÅÏ¢£¬£¬£¬¿ÉÄܵ¼ÖÂÄ£ÐÍÐÐΪµÄ²»³É¿ØÐÔ¡£¡£¡£
3.²»µ±Êä³ö´¦Öã¨Insecure Output Handling£©
LLMÌìÉúµÄÊä³ö±»´«µÝµ½ÆäËû×é¼þºÍϵͳµ¼ÖÂXSS¡¢¡¢CSRF¡¢¡¢SSRF¡¢¡¢RCEµÈ¡£¡£¡£
ËÄ¡¢¡¢ÖÎÀíά¶ÈÌôÕ½
1.Ä£ÐÍ͵ÇÔÓëÀÄÓà (Model Theft and Unauthorized Replication)
ͨ¹ýÄæÏò¹¤³Ì»òÆäËû¼¿Á©ÇÔȡģÐÍ֪ʶ£¬£¬£¬Ôì³É֪ʶ²úȨËðʧ»ò±»¶ñÒâÀÄÓᣡ£¡£
2.»Ø¾ø·þÎñ¹¥»÷ (Denial of Service Attack)
ͨ¹ý¸ßÇ¿¶ÈÒªÇó»ò¶ñÒâÊäÈ룬£¬£¬µ¼ÖÂÄ£ÐÍ·þÎñÎÞ·¨Õý³£ÏìÓ¦»ò³öÏÖϵͳ±ÀÀ£¡£¡£¡£
3.¹©¸øÁ´·ì϶ (Supply Chain Integrity Vulnerabilities)
´óÐÍ˵»°Ä£ÐÍ£¨LLM£©µÄ¹©¸øÁ´ÈÝÒ×Êܵ½¶àÖÖ·ì϶µÄÓ°Ï죬£¬£¬ÕâЩ·ì϶¿ÉÄÜ»áÇÖº¦ÑµÁ·Êý¾Ý¡¢¡¢Ä£ÐͺͲ¿Êðƽ̨µÄÆëÈ«ÐÔ¡£¡£¡£ÕâЩ·çÏÕ¿ÉÄܵ¼ÖÂÊä³öÎó²î¡¢¡¢°²È«·ì϶»òϵͳ¹ÊÕÏ¡£¡£¡£ÔÚ´«Í³Èí¼þ·ì϶ÖУ¬£¬£¬ÎÒÃÇͨ³£¹Ø×¢´úÂëȱµãºÍÒÀÀµ¹ØÏµ£¬£¬£¬µ«ÔÚ»úеѧϰ£¨ML£©ÁìÓò£¬£¬£¬·çÏÕ»¹À©´óµ½Á˵ÚÈý·½Ô¤ÑµÁ·Ä£ÐͺÍÊý¾Ý¡£¡£¡£
Õë¶ÔÉÏÊö·çÏÕ/ÍþвͼÆ×£¬£¬£¬·çÏÕÖØÒª¿É×ÛºÏΪÁ½Àࣺ£º£ºÒ»ÀàÊÇLLMÄ£ÐÍ×ÔÉíµÄ¹ÌÓзçÏÕ£¬£¬£¬ÁíÒ»ÀàÄ£ÐÍÓëÍⲿ»·¾³µÄ½»»¥ÔòÊÇ´ó²¿ÃÅÍþвµÄ¼¯ÖÐÌåÏÖ£¬£¬£¬»á¶ÔÓû§µÄÖ÷ÌâÒµÎñÔËÐÐÔì³ÉÑÏÖØÓ°Ï죬£¬£¬ÈçϱíËùʾ£º£º£º

´óÄ£ÐÍ·À»¤ÏµÍ³µÄ¼¼ÊõÌôÕ½¼°¹¹½¨õè¾¶
Ãæ¶ÔLLMÔÚÍⲿ½»»¥»·½ÚµÄ¸ß·çÏÕÐÔ£¬£¬£¬Óû§Ø½ÐèÒ»Ì×ϵͳ»¯µÄÕûÌå½â¾ö¹æ»®£¬£¬£¬ÒÔ¹¹½¨¶Ëµ½¶ËµÄ°²È«·À»¤ÏµÍ³£¬£¬£¬È·±£ÒµÎñµÄ°²È«ÐԺͲ»±äÐÔ¡£¡£¡£
ÔÚOG¶«·½ÌüµÄ×ۺϰ²Õû¸öϵÖУ¬£¬£¬MAF£¨Module Application Firewall£©ÖØÒªÃæÏòÊµÊ±ÍÆÀíÒµÎñ³¡¾°£¬£¬£¬Í¨¹ýÔÚÏß²¿Êð&ʵʱÀ¹½ØÄ£Ê½£¬£¬£¬¹¹½¨¶àά¶È°²È«·À»¤»úÖÆ£¬£¬£¬¶ÔÊäÈëÊä³öÄÚÈݽøÐÐÉî¶È°²È«¼ì²âÓë·À»¤¡£¡£¡£

Ò»¡¢¡¢ ÊäÈëÔ¤´¦ÖÃ
ÊäÈëÔ¤´¦ÖÃÊÇ´óÄ£ÐÍ·À»¤ÏµÍ³ÖеÄÖØÒª»·½Ú£¬£¬£¬OG¶«·½ÌüMAFͨ¹ýÔ¤´¦ÖÃÌáÉýÄ£Ð͵ÄЧÄܺÍÕýÈ·ÐÔ£¬£¬£¬ÓÐЧԤ·À¶ñÒâÊäÈë´øÀ´µÄ°²È«·çÏÕ¡£¡£¡£

OG¶«·½ÌüMAF½«À´×Ô·ÖÆç¸Ð֪ͨµÀµÄÊý¾Ý½øÐÐͳһ´¦ÖÃÓëÈںϡ£¡£¡£
? ÌØµã¼¶Èںϣº£º£ºÍ¨¹ýÌáȡÿÖÖģ̬µÄ¹Ø¼üÌØµã£¬£¬£¬²¢½«ÕâÐ©ÌØµãÏòÁ¿¹é²¢ÎªÒ»¸ö¸ßάÏòÁ¿£¬£¬£¬¹©ºóÐø´¦Öᣡ£¡£
? ¾ö²ß¼¶Èںϣº£º£º·ÖÆçģ̬µÄÊä³öÔÚ¾ö²ß²ãÃæ½øÐÐÈںϡ£¡£¡£Í¨¹ý½«¸÷ģ̬µÄÔ¤²âÁ˾ֽøÐмÓȨ¹é²¢£¬£¬£¬À´Ìá¸ßÄ£Ð͵Ä×îÖÕ¾ö²ßÕýÈ·ÐÔ¡£¡£¡£
¶þ¡¢¡¢ ÊäÈ밲ȫÖÎÀíϵͳ

? DDos»º½â£º£º£º»ùÓÚÁîÅÆ»úÖÆµÄBOT¼ì²â£¬£¬£¬Í¨¹ýµÝ½øÊ½Ñé֤ȷÈÏ£¬£¬£¬ÓÐЧ»º½â»Ø¾ø·þÎñ¹¥»÷¡£¡£¡£
? Íâ²ã¸ßËÙÆ¥Å䣺£º£º»ùÓÚSIMD¼Ó¿ì¼¼ÊõµÄÏÔʽÄÚÈÝÆ¥Å䣬£¬£¬Í¨¹ý¹ýÂËÀ¹½ØÈ·¶¨ÐÔÃô¸ÐÄÚÈÝ£¬£¬£¬·ÅÐÐÈ·¶¨ÐÔ°×Á÷Á¿¡£¡£¡£
? ÖвãÓïÒå·ÖÎö£º£º£º¶Ô¿ÉÒɵĶԻ°ÄÚÈÝ£¬£¬£¬Í¨¹ýÓïÁÏѵÁ·ÒÔ¼°²ÎÊý΢µ÷µÃµ½»ùÓÚTransformerµÄÉñ¾ÍøÂçÄ£ÐÍ£¬£¬£¬ÓÃÀ´Àí½âÈËÀà˵»°£¬£¬£¬½øÐиߵÍÎĹØÁª£¬£¬£¬¼ø±ðÒþʽ·çÏպ͸´ÔÓ¹¥»÷ģʽ¡£¡£¡£
? Éî²ã¾«×¼ÑÐÅУº£º£º¶Ô¸ß·çÏÕ¶Ô»°ÄÚÈÝ£¬£¬£¬»ùÓÚרÓüì²â´óÄ£ÐͽøÐÐÌìȻ˵»°Æ¥µÐʽ·ÖÎö£¬£¬£¬¾«×¼¼ø±ð¸´ÔÓÂß¼¿ò¼ÜϵÄÌáÐÑ´Ê×¢ÈëµÈ¶ñÒâÊäÈë¡£¡£¡£
Èý¡¢¡¢¶¯Ì¬Êä³ö°²È«½ÚÖÆÏµÍ³
OG¶«·½ÌüMAF×èÖ¹Ãô¸ÐÐÅϢй¶¡¢¡¢Îóµ¼ÐÔÄÚÈÝ´«²¼ÒÔ¼°ÏµÍ³ÌáÐÑ´Êй©µÈÎÊÌ⣬£¬£¬±£»£»£»¤Êý¾ÝÊä³öµÄ°²È«ÐÔ£¬£¬£¬ÌáÉýÄ£ÐÍÓëÓû§µÄ½»»¥ÖÊÁ¿£¬£¬£¬Ô¤·ÀDZÔڵĶñÒâÐÅÏ¢Êä³ö¡£¡£¡£
? Ãô¸ÐÐÅÏ¢¹ýÂËÓëÍÑÃô£º£º£ºÍ¨¹ýÏȽøµÄÌìȻ˵»°´¦Öã¨NLP£©¼¼ÊõºÍÉî¶ÈѧϰģÐÍ£¬£¬£¬OG¶«·½ÌüMAFʵÏÖ¶ÔÃô¸ÐÐÅÏ¢µÄ¾«×¼¼ø±ðÓë¸ßЧÍÑÃô£¬£¬£¬Ö§³Ö¶ÔÉí·ÝÖ¤¡¢¡¢ÊÖ»úºÅ¡¢¡¢ÌáÐѴʹ¤³Ì¡¢¡¢ÆäËû¹Ø¼üÒµÎñÐÅÏ¢µÈÄÚÈݵļø±ðºÍ´úÌæ¡£¡£¡£
? ϵͳÌáÐÑй©·À»¤£º£º£ºÆôÃ÷MAFÄÚÖ÷á˶µÄϵͳÓïÁϿ⣬£¬£¬²¢Ö§³Ö»ùÓÚÏÖʵҵÎñÐèÒª½ç˵Ӧ·À»¤µÄϵͳ¹Ø¼üÐÅÏ¢£¬£¬£¬ÒԴ˹¹½¨´óÄ£ÐͰ²È«Êä³öµÄ¼áʵ·®Àé¡£¡£¡£
? ²»µ±Êä³öÀ¹½Ø£º£º£ºOG¶«·½ÌüMAFʵÏÖ¶Ô»°Ê½·ÀÓù»úÖÆ¡£¡£¡£·ÖÆçÓÚ´«Í³¼¿Á©µÄ±»¶¯À¹½Ø£¬£¬£¬¶Ô»°Ê½À¹½ØÍ¨¹ýÓë´óÄ£ÐͽøÐÐʵʱ½»»¥£¬£¬£¬×Ô¶¯Êèµ¼¶Ô»°×ßÏò£¬£¬£¬¼ø±ð²¢×è¶ÏDZÔڵĹ¥»÷Òâͼ¡£¡£¡£
´óÄ£ÐͰ²È«·À»¤ÐèÍ»ÆÆ´«Í³ÍøÂ簲ȫ˼Ï룬£¬£¬³ÉÁ¢ÊÊÓ¦ÌìÉúʽAI¸öÐÔµÄÐÂÐÍ·ÀÓù·¶Ê½¡£¡£¡£OG¶«·½ÌüMAF´óÄ£ÐÍÀûÓ÷À»ðǽÐÖúÓû§¹¹½¨³ÖÐøÑݽøµÄ´óÄ£ÐͰ²È«ÖÎÀíϵͳ£¬£¬£¬´ÓÊäÈëÔ¤´¦Öᢡ¢ÊäÈ밲ȫÖÎÀíµ½¶¯Ì¬Êä³ö°²È«½ÚÖÆµÄ¶Ëµ½¶Ë´óÄ£ÐÍ·À»¤Õ½Êõ£¬£¬£¬±£ÏÕ¸÷Àà´óÄ£ÐÍÀûÓúÍÖÇÄÜÌåÒµÎñ°²È«¿¿µÃסµÄ½»¸¶ÔËÐС£¡£¡£


¾©¹«Íø°²±¸11010802024551ºÅ