LLM03 · OWASP LLM Top 10

Supply Chain (LLM03)

Vulnerabilities or compromises in upstream training data, pre-trained models, third-party datasets, model marketplaces, or fine-tuning services that affect the security of the deployed system.

Examples

  • A model downloaded from a hub contains a backdoor activated by a specific trigger phrase.
  • A training dataset includes poisoned samples that cause the model to misbehave on specific topics.
  • A vendor's fine-tuning service leaks the customer's training data.

Recommended controls

  • Model provenance tracking
  • Vendor security due diligence
  • Model fingerprinting on receipt
  • Reproducible training where applicable
  • Continuous vendor monitoring

Posture Check checkpoint

Posture Check questions Q26–Q30. Score affects Vendor dimension.

Score yourself against this framework.

The AI Posture Check is a free 30-question self-assessment that maps your gaps directly to OWASP LLM Top 10, NIST AI RMF, and ISO 42001.

Take the AI Posture Check
Need help operationalizing this?

Talk to a CWS engineer about your AI security program.

Schedule a Discovery Call to scope a Standard Audit or Enterprise Program.

Schedule a Discovery Call