---
name: owasp-llm
description: OWASP Top 10 for LLM Applications (2025) vulnerability knowledge base for identifying, assessing, and remediating security risks in large language model systems - Brought to you by microsoft/hve-core.
license: CC-BY-SA-4.0
user-invocable: false
metadata:
authors: "OWASP LLM Applications Security Initiative"
spec_version: "1.0"
framework_revision: "1.0.0"
last_updated: "2026-02-13"
skill_based_on: "https://github.com/chris-buckley/agnostic-prompt-standard"
content_based_on: "https://genai.owasp.org/resource/owasp-top-10-for-llm-applications-2025/"
---
# OWASP® LLM Top 10 — Skill Entry
This `SKILL.md` is the **entrypoint** for the OWASP LLM Top 10 skill.
The skill encodes the **OWASP Top 10 for LLM Applications (2025)** as structured,
machine-readable references that an agent can query to identify, assess, and remediate
security risks in large language model systems.
## Normative references (LLM Top 10)
1. [00 Vulnerability Index](references/00-vulnerability-index.md)
2. [01 Prompt Injection](references/01-prompt-injection.md)
3. [02 Sensitive Information Disclosure](references/02-sensitive-information-disclosure.md)
4. [03 Supply Chain](references/03-supply-chain.md)
5. [04 Data and Model Poisoning](references/04-data-and-model-poisoning.md)
6. [05 Improper Output Handling](references/05-improper-output-handling.md)
7. [06 Excessive Agency](references/06-excessive-agency.md)
8. [07 System Prompt Leakage](references/07-system-prompt-leakage.md)
9. [08 Vector and Embedding Weaknesses](references/08-vector-and-embedding-weaknesses.md)
10. [09 Misinformation](references/09-misinformation.md)
11. [10 Unbounded Consumption](references/10-unbounded-consumption.md)
## Skill layout
* `SKILL.md` — this file (skill entrypoint).
* `references/` — the LLM Top 10 normative documents.
* `00-vulnerability-index.md` — index of all vulnerability identifiers, categories, and cross-references.
* `01` through `10` — one document per vulnerability aligned with OWASP LLM Applications numbering.
## Third-Party Attribution
Copyright © OWASP Foundation.
OWASP® Top 10 for LLM Applications (2025) content is derived from works by the
OWASP Foundation, licensed under CC BY-SA 4.0
().
Source:
Modifications: Vulnerability descriptions restructured into agent-consumable reference
documents with added detection and remediation guidance.
OWASP® is a registered trademark of the OWASP Foundation. Use does not imply endorsement.
---
*🤖 Crafted with precision by ✨Copilot following brilliant human instruction, then carefully refined by our team of discerning human reviewers.*