You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
For the LLM10: Model Theft section, the second entry for "Common Examples of Vulnerabilities", should be shifted down to the "Prevention and Mitigation strategies" section.
Here is the entry:
"Use a centralized ML Model Inventory or Registry for ML models used in production.
baving a centralized model registry prevents unauthorized access to ML Models via
access controls, authentication, and monitoring/logging capability which are good
foundations for governance. baving a centralized repository is also beneficial for
collecting data about algorithms used by the models for the purposes of compliance,
risk assessments, and risk mitigation"
The text was updated successfully, but these errors were encountered:
👋 Thanks for reporting! Please ensure labels are applied appropriately to the issue so that the workflow automation can triage this to the correct member of the core team
👋 Thanks for reporting! Please ensure labels are applied appropriately to the issue so that the workflow automation can triage this to the correct member of the core team
For the LLM10: Model Theft section, the second entry for "Common Examples of Vulnerabilities", should be shifted down to the "Prevention and Mitigation strategies" section.
Here is the entry:
"Use a centralized ML Model Inventory or Registry for ML models used in production.
baving a centralized model registry prevents unauthorized access to ML Models via
access controls, authentication, and monitoring/logging capability which are good
foundations for governance. baving a centralized repository is also beneficial for
collecting data about algorithms used by the models for the purposes of compliance,
risk assessments, and risk mitigation"
The text was updated successfully, but these errors were encountered: