Z6×ðÁú¿Ê±MAFÖ±ÃæOWASP LLM Top10Íþвȫ¾°
Ðû²¼Ê±¼ä 2025-02-21"ÈÃÿһ¾äÈË»ú¶Ô»°¶¼Çå¾²¿ÉÐÅ£¬£¬£¬£¬£¬ÈÃÿһ´ÎÖÇÄܽ»»¥¶¼Î£º¦¿É¿Ø¡ª¡ªÕâÊÇÊôÓÚAIʱ´úµÄÇå¾²ÔÊÐí¡£¡£¡£ ¡ª¡ª Z6×ðÁú¿Ê±"
ǰÑÔ£º
Çå¾²Íþвͼ¼ø
OWASPµÄ¡¶´ó¹æÄ£ÓïÑÔÄ£×ÓÓ¦Óà Top 10¡·ÏîĿʼÓÚ2023Ä꣬£¬£¬£¬£¬Ö¼ÔÚÍ»³ö²¢½â¾öÓëÈ˹¤ÖÇÄÜÓ¦ÓÃÏà¹ØµÄÇå¾²ÎÊÌâ¡£¡£¡£2025Äê¸üеİ汾¶ÔÏÖÓÐΣº¦ÓÐÁ˸üÉîÌõÀíÃ÷È·£¬£¬£¬£¬£¬²¢ÄÉÈëÁËLLMÔÚÏÖʵӦÓÃÖеÄ×îÐÂÖ÷ҪϣÍû¡£¡£¡£ÈçÏÂͼ£º

Ò»¡¢ÑµÁ·Êý¾Ý²ãΣº¦
1.ѵÁ·Êý¾ÝͶ¶¾¹¥»÷ (Training Data Poisoning Exploitation)
¶ÔѵÁ·Êý¾Ý¾ÙÐжñÒâ×ÌÈÅ»ò¸Ä¶¯£¬£¬£¬£¬£¬µ¼ÖÂÄ£×Óѧϰ¹ýʧµÄģʽ£¬£¬£¬£¬£¬Ó°ÏìÄ£×ÓµÄÐÔÄܺÍ׼ȷÐÔ¡£¡£¡£
2.Ì«¹ýÒÀÀµ (Excessive Feature Dependency)
Ä£×ÓÔÚÄ³Ð©ÌØÕ÷Éϱ£´æÌ«¹ýÒÀÀµ£¬£¬£¬£¬£¬µ¼ÖÂÆä¶ÔÒì³£ÊäÈë»ò¹¥»÷ÌåÏÖ³öųÈõÐÔ¡£¡£¡£
3.ÏòÁ¿ÓëǶÈëÈõµã (Embedding and Vector Representation Vulnerabilities)
Ä£×ÓµÄǶÈëÏòÁ¿»òÊý¾Ý±íÕ÷±£´æÈõµã£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÄÜʹÓÃÕâЩÈõµã¾ÙÐÐDZÔڵĹ¥»÷¡£¡£¡£
4.ÐéαÐÅÏ¢ (Misinformation Dissemination)
Ä£×ÓÌìÉúµÄÐÅÏ¢½û¾øÈ·»òÐéᣬ£¬£¬£¬£¬µ¼ÖÂÎóµ¼Óû§»òÔì³ÉÉç»áºÍÇå¾²ÎÊÌâ¡£¡£¡£
5.²»Çå¾²²å¼þ£¨Insecure Plugins£©
¼¯³ÉµÄÍⲿ²å¼þ»òÄ£¿£¿£¿£¿é±£´æÎó²î£¬£¬£¬£¬£¬¿ÉÄÜΪ¹¥»÷ÕßÌṩδÊÚȨ»á¼û»òÖ´ÐжñÒâ²Ù×÷µÄ·¾¶¡£¡£¡£
¶þ¡¢ÊäÈë²ãÇ徲Σº¦
1.ÌáÐÑ×¢Èë¹¥»÷£¨Prompt Injection£©
¹¥»÷Õßͨ¹ý½á¹¹¶Ô¿¹ÐÔÌáÐÑ´ÊÍ»ÆÆÏµÍ³Ô¤ÉèÖ¸Á£¬£¬£¬£¬ÓÕµ¼Ä£×ӸıäÆäÐÐΪ»òÊä³ö¡£¡£¡£
2.Ä£×ÓÔ½ÓüΣº¦£¨Model Jailbreaking£©
Ô½ÓüÊÇÒ»ÖÖÌØÊâµÄÌáÐÑ×¢È룬£¬£¬£¬£¬¹¥»÷ÕßÌṩÊäÈ룬£¬£¬£¬£¬µ¼ÖÂÄ£×ÓÍêÈ«ÎÞÊÓÆäÒÑÓеÄÇå¾²ÐÒé¡£¡£¡£
3.Ì«¹ýÊðÀíΣº¦ (Excessive Proxying Risks)
LLM À©Õ¹ÔÚÏÂÓÎϵͳÉÏÓµÓÐÁè¼ÝÓ¦ÓóÌÐòÔ¤ÆÚ²Ù×÷ËùÐèµÄȨÏÞ£¬£¬£¬£¬£¬ÀýÈçÒ»¸ö±¾Ó¦Ö»¶ÁÈ¡Êý¾ÝµÄÀ©Õ¹Ê¹ÓõÄÕË»§²»µ«ÓµÓÐ SELECT ȨÏÞ£¬£¬£¬£¬£¬»¹ÓµÓÐ UPDATE¡¢INSERT ºÍ DELETE ȨÏÞ£¬£¬£¬£¬£¬Äܹ»ÅþÁ¬µ½Êý¾Ý¿âЧÀÍÆ÷¡£¡£¡£
Èý¡¢Êä³ö²ãÇ徲Σº¦
1.Ãô¸ÐÐÅϢй¶£¨Sensitive Information Disclosure£©
Ä£×ÓÔÚÎÞÒâÖÐÌìÉúÊä³ö£¬£¬£¬£¬£¬Ð¹Â¶Ãô¸Ð»òÉñÃØÊý¾Ý£¬£¬£¬£¬£¬µ¼ÖÂÒþ˽й¶ºÍÐÅÏ¢Çå¾²ÎÊÌâ¡£¡£¡£
2.ϵͳÌáÐÑй¶£¨System Prompt Leak£©
¹¥»÷Õßͨ¹ýÄæÏò¹¤³Ì»òÆäËûÊֶλñȡģ×ÓµÄÄÚ²¿ÌáÐÑÐÅÏ¢£¬£¬£¬£¬£¬¿ÉÄܵ¼ÖÂÄ£×ÓÐÐΪµÄ²»¿É¿ØÐÔ¡£¡£¡£
3.²»µ±ÊäÀ´ÓÉÖã¨Insecure Output Handling£©
LLMÌìÉúµÄÊä³ö±»×ª´ïµ½ÆäËû×é¼þºÍϵͳµ¼ÖÂXSS¡¢CSRF¡¢SSRF¡¢RCEµÈ¡£¡£¡£
ËÄ¡¢ÖÎÀíά¶ÈÌôÕ½
1.Ä£×Ó͵ÇÔÓëÀÄÓà (Model Theft and Unauthorized Replication)
ͨ¹ýÄæÏò¹¤³Ì»òÆäËûÊÖ¶ÎÇÔȡģ×Ó֪ʶ£¬£¬£¬£¬£¬Ôì³É֪ʶ²úȨËðʧ»ò±»¶ñÒâÀÄÓᣡ£¡£
2.¾Ü¾øÐ§À͹¥»÷ (Denial of Service Attack)
ͨ¹ý¸ßÇ¿¶ÈÇëÇó»ò¶ñÒâÊäÈ룬£¬£¬£¬£¬µ¼ÖÂÄ£×ÓЧÀÍÎÞ·¨Õý³£ÏìÓ¦»ò·ºÆðϵͳÍ߽⡣¡£¡£
3.¹©Ó¦Á´Îó²î (Supply Chain Integrity Vulnerabilities)
´óÐÍÓïÑÔÄ£×Ó£¨LLM£©µÄ¹©Ó¦Á´ÈÝÒ×Êܵ½¶àÖÖÎó²îµÄÓ°Ï죬£¬£¬£¬£¬ÕâЩÎó²î¿ÉÄÜ»áËðº¦ÑµÁ·Êý¾Ý¡¢Ä£×ӺͰ²ÅÅÆ½Ì¨µÄÍêÕûÐÔ¡£¡£¡£ÕâЩΣº¦¿ÉÄܵ¼ÖÂÊä³öÎó²î¡¢Çå¾²Îó²î»òϵͳ¹ÊÕÏ¡£¡£¡£ÔڹŰåÈí¼þÎó²îÖУ¬£¬£¬£¬£¬ÎÒÃÇͨ³£¹Ø×¢´úÂëȱÏݺÍÒÀÀµ¹ØÏµ£¬£¬£¬£¬£¬µ«ÔÚ»úеѧϰ£¨ML£©ÁìÓò£¬£¬£¬£¬£¬Î£º¦»¹À©Õ¹µ½Á˵ÚÈý·½Ô¤ÑµÁ·Ä£×ÓºÍÊý¾Ý¡£¡£¡£
Õë¶ÔÉÏÊöΣº¦/ÍþвͼÆ×£¬£¬£¬£¬£¬Î£º¦Ö÷Òª¿É¹éÄÉΪÁ½ÀࣺһÀàÊÇLLMÄ£×Ó×ÔÉíµÄ¹ÌÓÐΣº¦£¬£¬£¬£¬£¬ÁíÒ»ÀàÄ£×ÓÓëÍⲿÇéÐεĽ»»¥ÔòÊǴ󲿷ÖÍþвµÄ¼¯ÖÐÌåÏÖ£¬£¬£¬£¬£¬»á¶ÔÓû§µÄ½¹µãÓªÒµÔËÐÐÔì³ÉÑÏÖØÓ°Ï죬£¬£¬£¬£¬ÈçϱíËùʾ£º

´óÄ£×Ó·À»¤ÏµÍ³µÄÊÖÒÕÌôÕ½¼°¹¹½¨Â·¾¶
ÃæÁÙLLMÔÚÍⲿ½»»¥»·½ÚµÄ¸ßΣº¦ÐÔ£¬£¬£¬£¬£¬Óû§Ø½ÐèÒ»Ì×ϵͳ»¯µÄÕûÌå½â¾ö¼Æ»®£¬£¬£¬£¬£¬ÒÔ¹¹½¨¶Ëµ½¶ËµÄÇå¾²·À»¤ÏµÍ³£¬£¬£¬£¬£¬È·±£ÓªÒµµÄÇå¾²ÐÔºÍÎȹÌÐÔ¡£¡£¡£
ÔÚZ6×ðÁú¿Ê±µÄ×ÛºÏÇ徲ϵͳÖУ¬£¬£¬£¬£¬MAF£¨Module Application Firewall£©Ö÷ÒªÃæÏòÊµÊ±ÍÆÀíÓªÒµ³¡¾°£¬£¬£¬£¬£¬Í¨¹ýÔÚÏß°²ÅÅ&ʵʱ×赲ģʽ£¬£¬£¬£¬£¬¹¹½¨¶àά¶ÈÇå¾²·À»¤»úÖÆ£¬£¬£¬£¬£¬¶ÔÊäÈëÊä³öÄÚÈݾÙÐÐÉî¶ÈÇå¾²¼ì²âÓë·À»¤¡£¡£¡£

Ò»¡¢ ÊäÈëÔ¤´¦Öóͷ£
ÊäÈëÔ¤´¦Öóͷ£ÊÇ´óÄ£×Ó·À»¤ÏµÍ³ÖеÄÖ÷Òª»·½Ú£¬£¬£¬£¬£¬Z6×ðÁú¿Ê±MAFͨ¹ýÔ¤´¦Öóͷ£ÌáÉýÄ£×ÓµÄЧÂʺÍ׼ȷÐÔ£¬£¬£¬£¬£¬ÓÐÓñÜÃâ¶ñÒâÊäÈë´øÀ´µÄÇ徲Σº¦¡£¡£¡£

Z6×ðÁú¿Ê±MAFδÀ´×Ô²î±ð¸Ð֪ͨµÀµÄÊý¾Ý¾ÙÐÐͳһ´¦Öóͷ£ÓëÈںϡ£¡£¡£
? ÌØÕ÷¼¶ÈںϣºÍ¨¹ýÌáȡÿÖÖģ̬µÄÒªº¦ÌØÕ÷£¬£¬£¬£¬£¬²¢½«ÕâÐ©ÌØÕ÷ÏòÁ¿ºÏ²¢ÎªÒ»¸ö¸ßάÏòÁ¿£¬£¬£¬£¬£¬¹©ºóÐø´¦Öóͷ£¡£¡£¡£
? ¾öÒé¼¶Èںϣº²î±ðģ̬µÄÊä³öÔÚ¾öÒé²ãÃæ¾ÙÐÐÈںϡ£¡£¡£Í¨¹ý½«¸÷ģ̬µÄÕ¹ÍûЧ¹û¾ÙÐмÓȨºÏ²¢£¬£¬£¬£¬£¬À´Ìá¸ßÄ£×ÓµÄ×îÖÕ¾öÒé׼ȷÐÔ¡£¡£¡£
¶þ¡¢ ÊäÈëÇå¾²ÖÎÀíϵͳ

? DDos»º½â£º»ùÓÚÁîÅÆ»úÖÆµÄBOT¼ì²â£¬£¬£¬£¬£¬Í¨¹ýµÝ½øÊ½Ñé֤ȷÈÏ£¬£¬£¬£¬£¬ÓÐÓûº½â¾Ü¾øÐ§À͹¥»÷¡£¡£¡£
? Íâ²ã¸ßËÙÆ¥Å䣺»ùÓÚSIMD¼ÓËÙÊÖÒÕµÄÏÔʽÄÚÈÝÆ¥Å䣬£¬£¬£¬£¬Í¨¹ý¹ýÂË×赲ȷ¶¨ÐÔÃô¸ÐÄÚÈÝ£¬£¬£¬£¬£¬·ÅÐÐÈ·¶¨ÐÔ°×Á÷Á¿¡£¡£¡£
? ÖвãÓïÒåÆÊÎö£º¶Ô¿ÉÒɵĶԻ°ÄÚÈÝ£¬£¬£¬£¬£¬Í¨¹ýÓïÁÏѵÁ·ÒÔ¼°²ÎÊý΢µ÷»ñµÃ»ùÓÚTransformerµÄÉñ¾ÍøÂçÄ£×Ó£¬£¬£¬£¬£¬ÓÃÀ´Ã÷È·ÈËÀàÓïÑÔ£¬£¬£¬£¬£¬¾ÙÐÐÉÏÏÂÎĹØÁª£¬£¬£¬£¬£¬Ê¶±ðÒþʽΣº¦ºÍÖØ´ó¹¥»÷ģʽ¡£¡£¡£
? Éî²ã¾«×¼ÑÐÅУº¶Ô¸ßΣº¦¶Ô»°ÄÚÈÝ£¬£¬£¬£¬£¬»ùÓÚרÓüì²â´óÄ£×Ó¾ÙÐÐ×ÔÈ»ÓïÑÔ¶Ô¿¹Ê½ÆÊÎö£¬£¬£¬£¬£¬¾«×¼Ê¶±ðÖØ´óÂß¼¿ò¼ÜϵÄÌáÐÑ´Ê×¢ÈëµÈ¶ñÒâÊäÈë¡£¡£¡£
Èý¡¢¶¯Ì¬Êä³öÇå¾²¿ØÖÆÏµÍ³
Z6×ðÁú¿Ê±MAF×èÖ¹Ãô¸ÐÐÅϢй¶¡¢Îóµ¼ÐÔÄÚÈÝÈö²¥ÒÔ¼°ÏµÍ³ÌáÐÑ´Ê×ß©µÈÎÊÌ⣬£¬£¬£¬£¬±£»£»£»£»£»£»¤Êý¾ÝÊä³öµÄÇå¾²ÐÔ£¬£¬£¬£¬£¬ÌáÉýÄ£×ÓÓëÓû§µÄ½»»¥ÖÊÁ¿£¬£¬£¬£¬£¬×èֹDZÔڵĶñÒâÐÅÏ¢Êä³ö¡£¡£¡£
? Ãô¸ÐÐÅÏ¢¹ýÂËÓëÍÑÃô£ºÍ¨¹ýÏȽøµÄ×ÔÈ»ÓïÑÔ´¦Öóͷ££¨NLP£©ÊÖÒÕºÍÉî¶Èѧϰģ×Ó£¬£¬£¬£¬£¬Z6×ðÁú¿Ê±MAFʵÏÖ¶ÔÃô¸ÐÐÅÏ¢µÄ¾«×¼Ê¶±ðÓë¸ßЧÍÑÃô£¬£¬£¬£¬£¬Ö§³Ö¶ÔÉí·ÝÖ¤¡¢ÊÖ»úºÅ¡¢ÌáÐѴʹ¤³Ì¡¢ÆäËûÒªº¦ÓªÒµÐÅÏ¢µÈÄÚÈݵÄʶ±ðºÍÌæ»»¡£¡£¡£
? ϵͳÌáÐÑ×ß©·À»¤£ºÆôÃ÷MAFÄÚÖø»ºñµÄϵͳÓïÁϿ⣬£¬£¬£¬£¬²¢Ö§³Ö»ùÓÚÏÖʵӪҵÐèÇó½ç˵Ӧ·À»¤µÄϵͳҪº¦ÐÅÏ¢£¬£¬£¬£¬£¬ÒԴ˹¹½¨´óÄ£×ÓÇå¾²Êä³öµÄ¼áʵÆÁÕÏ¡£¡£¡£
? ²»µ±Êä³ö×èµ²£ºZ6×ðÁú¿Ê±MAFʵÏÖ¶Ô»°Ê½·ÀÓù»úÖÆ¡£¡£¡£²î±ðÓڹŰåÊֶεı»¶¯×èµ²£¬£¬£¬£¬£¬¶Ô»°Ê½×赲ͨ¹ýÓë´óÄ£×Ó¾ÙÐÐʵʱ½»»¥£¬£¬£¬£¬£¬×Ô¶¯Ö¸µ¼¶Ô»°×ßÏò£¬£¬£¬£¬£¬Ê¶±ð²¢×è¶ÏDZÔڵĹ¥»÷Òâͼ¡£¡£¡£
´óÄ£×ÓÇå¾²·À»¤ÐèÍ»ÆÆ¹Å°åÍøÂçÇ徲ͷÄÔ£¬£¬£¬£¬£¬½¨Éè˳ӦÌìÉúʽAIÌØÕ÷µÄÐÂÐÍ·ÀÓù·¶Ê½¡£¡£¡£Z6×ðÁú¿Ê±MAF´óÄ£×ÓÓ¦Ó÷À»ðǽÐÖúÓû§¹¹½¨Ò»Á¬ÑݽøµÄ´óÄ£×ÓÇå¾²ÖÎÀíϵͳ£¬£¬£¬£¬£¬´ÓÊäÈëÔ¤´¦Öóͷ£¡¢ÊäÈëÇå¾²ÖÎÀíµ½¶¯Ì¬Êä³öÇå¾²¿ØÖƵĶ˵½¶Ë´óÄ£×Ó·À»¤Õ½ÂÔ£¬£¬£¬£¬£¬°ü¹ÜÖÖÖÖ´óÄ£×ÓÓ¦ÓúÍÖÇÄÜÌåÓªÒµÇå¾²¿É¿¿µÄ½»¸¶ÔËÐС£¡£¡£


¾©¹«Íø°²±¸11010802024551ºÅ