LLM Security Research and Resources

Jailbreaking

Prompt Injection

Backdoors & Data Poisoning

Adversarial Inputs

Insecure Output Handling

Data Extraction and Privacy

Data Reconstruction

Model Denial of Service (DoS)

Privilege Escalation

Watermarking and Evasion