Sensitive Information Exposure
Table of contents
- Cardholder Data Privacy Violation Vulnerability
- Human-Agent Trust Exploitation Vulnerability in LLM
- Lack of Data Anonymization Vulnerability
- Model Theft Vulnerability in LLM
- Sensitive Information Disclosure Vulnerability
- Tool Misuse & Exploitation Vulnerability in LLM
- Use of Hard-Coded Secrets Vulnerability