blog.includesecurity.com/2025/07/llms-in-applications-understanding-and-scoping-attack-surface
Preview meta tags from the blog.includesecurity.com website.
Linked Hostnames
5- 19 links toblog.includesecurity.com
- 3 links toincludesecurity.com
- 2 links toowasp.org
- 1 link toinnovation.consumerreports.org
- 1 link totwitter.com
Thumbnail

Search Engine Appearance
LLMs in Applications - Understanding and Scoping Attack Surface - Include Security Research Blog
In this post we consider how to think about the attack surface of applications leveraging LLMs and how that impacts the scoping process when assessing those applications. We discuss why scoping matters, important points to consider when mapping out the LLM-associated attack surface, and conclude with architectural tips for developers implementing LLMs within their applications.
Bing
LLMs in Applications - Understanding and Scoping Attack Surface - Include Security Research Blog
In this post we consider how to think about the attack surface of applications leveraging LLMs and how that impacts the scoping process when assessing those applications. We discuss why scoping matters, important points to consider when mapping out the LLM-associated attack surface, and conclude with architectural tips for developers implementing LLMs within their applications.
DuckDuckGo
LLMs in Applications - Understanding and Scoping Attack Surface - Include Security Research Blog
In this post we consider how to think about the attack surface of applications leveraging LLMs and how that impacts the scoping process when assessing those applications. We discuss why scoping matters, important points to consider when mapping out the LLM-associated attack surface, and conclude with architectural tips for developers implementing LLMs within their applications.
General Meta Tags
9- titleLLMs in Applications - Understanding and Scoping Attack Surface - Include Security Research Blog
- charsetUTF-8
- robotsindex, follow, max-image-preview:large, max-snippet:-1, max-video-preview:-1
- article:published_time2025-07-17T19:01:53+00:00
- article:modified_time2025-07-17T19:01:54+00:00
Open Graph Meta Tags
10og:locale
en_US- og:typearticle
- og:titleLLMs in Applications - Understanding and Scoping Attack Surface - Include Security Research Blog
- og:descriptionIn this post we consider how to think about the attack surface of applications leveraging LLMs and how that impacts the scoping process when assessing those applications. We discuss why scoping matters, important points to consider when mapping out the LLM-associated attack surface, and conclude with architectural tips for developers implementing LLMs within their applications.
- og:urlhttps://blog.includesecurity.com/2025/07/llms-in-applications-understanding-and-scoping-attack-surface/
Twitter Meta Tags
7- twitter:cardsummary_large_image
- twitter:creator@includesecurity
- twitter:site@includesecurity
- twitter:label1Written by
- twitter:data1Mark Kornfeld
Link Tags
38- EditURIhttps://blog.includesecurity.com/xmlrpc.php?rsd
- alternatehttps://blog.includesecurity.com/feed/
- alternatehttps://blog.includesecurity.com/comments/feed/
- alternatehttps://blog.includesecurity.com/2025/07/llms-in-applications-understanding-and-scoping-attack-surface/feed/
- alternatehttps://blog.includesecurity.com/wp-json/wp/v2/posts/3064
Links
26- https://blog.includesecurity.com
- https://blog.includesecurity.com/2024/01/improving-llm-security-against-prompt-injection-appsec-guidance-for-pentesters-and-developers
- https://blog.includesecurity.com/2024/02/improving-llm-security-against-prompt-injection-appsec-guidance-for-pentesters-and-developers-part-2
- https://blog.includesecurity.com/2025/05/misinterpreted-what-penetration-test-reports-actually-mean
- https://blog.includesecurity.com/2025/07/llms-in-applications-understanding-and-scoping-attack-surface/#respond