genai.owasp.org
Resources curated from this publisher and indexed across appsec.fyi topic pages. Last item added: 2026-04-11.
| Date Added | Resource | Excerpt |
|---|---|---|
| 2026-04-11 2026 | OWASP Top 10 for LLM Applications 2025AI | OWASP Top 10 for LLM Applications 2025 |
| 2026-04-11 2026 | OWASP GenAI Top 10 Risks and Mitigations for Agentic AI SecurityAI | Library defining the OWASP Top 10 for Agentic Applications, a comprehensive resource for identifying and mitigating risks associated with autonomous AI agents. Developed through input from over 100 industry leaders, it highlights threats such as Agent Behavior Hijacking, Tool Misuse and Exploitation, and Identity and Privilege Abuse. This framework complements existing OWASP GenAI resources, offering practical, actionable guidance grounded in real-world attacks and mitigations to promote the secure development and deployment of generative AI systems. |
| 2026-04-10 2026 | OWASP Global AppSec EU 2025 - GenAI FocusTalks | Conference of cybersecurity experts focusing on Generative AI security, featuring the OWASP GenAI Security Project. Sessions will cover secure AI adoption, incident response, risks of autonomous AI agents, and scaling community-driven security initiatives. Specific topics include Agentic Security Risks and general GenAI project business tactics. |
| 2026-04-10 2026 | OWASP Global AppSec USA 2025 (Washington DC)Talks | Conference proceedings from OWASP Global AppSec USA 2025 in Washington D.C. cover application security through six curated tracks: builder/developer, breaker, defender, manager-culture, and OWASP Projects. The event features keynote speakers, interactive sessions, and opportunities for networking among over 800 security experts. |
| 2026-04-03 2026 | LLM01:2025 Prompt Injection | OWASP Gen AI SecurityAI | Reference detailing LLM01:2025 Prompt Injection, a vulnerability where user prompts unintendedly alter Large Language Model behavior. The OWASP Gen AI Security resource covers direct and indirect injections, including scenarios like CVE-2024-5184 exploitation in email assistants and multimodal attacks. It outlines mitigation strategies such as constraining model behavior, input/output filtering, and adversarial testing, emphasizing that while prevention is challenging, impact reduction is achievable. |