blog.includesecurity.com/2025/07/llms-in-applications-understanding-and-scoping-attack-surface

Preview meta tags from the blog.includesecurity.com website.

Linked Hostnames

5

Thumbnail

Search Engine Appearance

Google

https://blog.includesecurity.com/2025/07/llms-in-applications-understanding-and-scoping-attack-surface

LLMs in Applications - Understanding and Scoping Attack Surface - Include Security Research Blog

In this post we consider how to think about the attack surface of applications leveraging LLMs and how that impacts the scoping process when assessing those applications. We discuss why scoping matters, important points to consider when mapping out the LLM-associated attack surface, and conclude with architectural tips for developers implementing LLMs within their applications.



Bing

LLMs in Applications - Understanding and Scoping Attack Surface - Include Security Research Blog

https://blog.includesecurity.com/2025/07/llms-in-applications-understanding-and-scoping-attack-surface

In this post we consider how to think about the attack surface of applications leveraging LLMs and how that impacts the scoping process when assessing those applications. We discuss why scoping matters, important points to consider when mapping out the LLM-associated attack surface, and conclude with architectural tips for developers implementing LLMs within their applications.



DuckDuckGo

https://blog.includesecurity.com/2025/07/llms-in-applications-understanding-and-scoping-attack-surface

LLMs in Applications - Understanding and Scoping Attack Surface - Include Security Research Blog

In this post we consider how to think about the attack surface of applications leveraging LLMs and how that impacts the scoping process when assessing those applications. We discuss why scoping matters, important points to consider when mapping out the LLM-associated attack surface, and conclude with architectural tips for developers implementing LLMs within their applications.

  • General Meta Tags

    9
    • title
      LLMs in Applications - Understanding and Scoping Attack Surface - Include Security Research Blog
    • charset
      UTF-8
    • robots
      index, follow, max-image-preview:large, max-snippet:-1, max-video-preview:-1
    • article:published_time
      2025-07-17T19:01:53+00:00
    • article:modified_time
      2025-07-17T19:01:54+00:00
  • Open Graph Meta Tags

    10
    • US country flagog:locale
      en_US
    • og:type
      article
    • og:title
      LLMs in Applications - Understanding and Scoping Attack Surface - Include Security Research Blog
    • og:description
      In this post we consider how to think about the attack surface of applications leveraging LLMs and how that impacts the scoping process when assessing those applications. We discuss why scoping matters, important points to consider when mapping out the LLM-associated attack surface, and conclude with architectural tips for developers implementing LLMs within their applications.
    • og:url
      https://blog.includesecurity.com/2025/07/llms-in-applications-understanding-and-scoping-attack-surface/
  • Twitter Meta Tags

    7
    • twitter:card
      summary_large_image
    • twitter:creator
      @includesecurity
    • twitter:site
      @includesecurity
    • twitter:label1
      Written by
    • twitter:data1
      Mark Kornfeld
  • Link Tags

    38
    • EditURI
      https://blog.includesecurity.com/xmlrpc.php?rsd
    • alternate
      https://blog.includesecurity.com/feed/
    • alternate
      https://blog.includesecurity.com/comments/feed/
    • alternate
      https://blog.includesecurity.com/2025/07/llms-in-applications-understanding-and-scoping-attack-surface/feed/
    • alternate
      https://blog.includesecurity.com/wp-json/wp/v2/posts/3064

Links

26