Generative AI security-II
A practical follow-up on deploying LLM features: treat the model as untrusted, control both prompts and outputs, and assume cost is a product constraint. I map concrete mitigations to the OWASP GenAI Top 10 (2025) and discuss what to look for in an AI gateway.
Read the post