Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
awesome-llm-agent-security
All about llm-agents security,attack,vulnerabilities and how to do them for cybersecurity.
https://github.com/wearetyomsmnv/awesome-llm-agent-security
Last synced: 3 days ago
JSON representation
-
Security Landscape
-
🔒 OWASP Top 10 for AI Agents (Non official)
- ARE-08
- ASC-09
- AKP-10
- Damn Vulnerable LLM Agent - ReAct agent testing<br>- Prompt injection scenarios<br>- SQL injection practice | Learning prompt & ReAct injection techniques |
- Medusa - Agent vulnerability testing<br>- Security assessment<br>- Attack simulation | Practical security testing |
- AAC-01
- ACS-02
- AGI-03
- AHE-04
- AIC-05
- AMC-06
- AOR-07 - agent system vulnerabilities |
- AAC-01
- ACS-02
- AGI-03
- AHE-04
- AIC-05
- AMC-06
- AOR-07 - agent system vulnerabilities |
- ARE-08
- ASC-09
- AKP-10
- Damn Vulnerable LLM Agent - ReAct agent testing<br>- Prompt injection scenarios<br>- SQL injection practice | Learning prompt & ReAct injection techniques |
- Medusa - Agent vulnerability testing<br>- Security assessment<br>- Attack simulation | Practical security testing |
-
-
📚 Research & Publications
-
🔒 OWASP Top 10 for AI Agents (Non official)
- Security Concerns with AI Agents - 52.5% data leakage predicted by 2025<br>- Market growth to $7.41B<br>- PII exposure risks |
- Beyond RCE: Autonomous Code Execution - Code execution risks<br>- Agent autonomy threats<br>- Security implications |
- Exploiting Huggingface's Assistants - Data extraction vulnerabilities<br>- Assistant exploitation<br>- Security measures |
- Key Challenges in AI Agent Security - Confidentiality risks<br>- Integrity concerns<br>- Availability threats |
- HackSynth - Vulnerability assessment<br>- Attack simulation<br>- Security validation |
- OsintAGI - Intelligence gathering<br>- Data analysis<br>- Automated research |
- Agent-Smith - Behavior analysis<br>- Vulnerability detection<br>- Security assessment |
- AI-OPS - Threat detection<br>- Response automation<br>- Security monitoring |
- Agent-Attack - Attack vectors<br>- Defense evaluation<br>- Risk assessment |
- Auto-Pen-Bench - Automated testing<br>- Performance metrics<br>- Security scoring |
- ASB - Security metrics<br>- Performance analysis<br>- Vulnerability testing |
- LLM-Agent-Benchmark - Security testing<br>- Performance metrics<br>- Benchmark collection |
- Multi-Agent-SecOps - based security | - Threat detection<br>- Response automation<br>- Security monitoring |
- Cyber-Security-LLM-Agents - based security | - Security automation<br>- Threat analysis<br>- Response coordination |
- Ridge Security - Vulnerability assessment<br>- Security testing<br>- Risk management |
- Security Concerns with AI Agents - 52.5% data leakage predicted by 2025<br>- Market growth to $7.41B<br>- PII exposure risks |
- Key Challenges in AI Agent Security - Confidentiality risks<br>- Integrity concerns<br>- Availability threats |
- Beyond RCE: Autonomous Code Execution - Code execution risks<br>- Agent autonomy threats<br>- Security implications |
- Exploiting Huggingface's Assistants - Data extraction vulnerabilities<br>- Assistant exploitation<br>- Security measures |
- HackSynth - Vulnerability assessment<br>- Attack simulation<br>- Security validation |
- OsintAGI - Intelligence gathering<br>- Data analysis<br>- Automated research |
- Agent-Smith - Behavior analysis<br>- Vulnerability detection<br>- Security assessment |
- AI-OPS - Threat detection<br>- Response automation<br>- Security monitoring |
- Agent-Attack - Attack vectors<br>- Defense evaluation<br>- Risk assessment |
- Auto-Pen-Bench - Automated testing<br>- Performance metrics<br>- Security scoring |
- ASB - Security metrics<br>- Performance analysis<br>- Vulnerability testing |
- LLM-Agent-Benchmark - Security testing<br>- Performance metrics<br>- Benchmark collection |
- Multi-Agent-SecOps - based security | - Threat detection<br>- Response automation<br>- Security monitoring |
- Cyber-Security-LLM-Agents - based security | - Security automation<br>- Threat analysis<br>- Response coordination |
- Ridge Security - Vulnerability assessment<br>- Security testing<br>- Risk management |
- The Double AI Agent - Agent manipulation techniques<br>- Double agent scenarios<br>- Defense strategies |
-
Programming Languages
Sub Categories