Common sources of data that attackers modify to introduce security risks into your LLM App Systems:

  • Webpages
  • Support Tickets
  • Public Repositories
  • Logs
  • Documents
  • CRM
  • Linkedin
  • Emails
  • Invoices
  • Contracts
  • Resumes

Any data that can be modified by an attacker, will be modified by an attacker. Almost all data should be considered untrusted unless it is proven not to be.