{"height":"190","width":"100%","type":"rich","provider_name":"Hatena Blog","blog_url":"https://cysec148.hatenablog.com/","title":"\u3010\u6709\u6599\u8a66\u4f5c\u7248\u3011LLM03:2025 Supply Chain  \u30cf\u30c3\u30ab\u30fc\u8996\u70b9\u306e\u653b\u6483\u30b7\u30ca\u30ea\u30aa\u96c6","provider_url":"https://hatena.blog","image_url":null,"author_url":"https://blog.hatena.ne.jp/ThisIsOne/","description":"Hello there, ('\u03c9')\u30ce \u30b7\u30ca\u30ea\u30aa #1\uff1a\u4f9d\u5b58\u30e9\u30a4\u30d6\u30e9\u30ea\u304b\u3089\u306e\u4fb5\u5165\uff08Vulnerable Python Library\uff09 \u653b\u6483\u8005\u306e\u767a\u60f3 \u300cAI\u958b\u767a\u8005\u306fPyPI\u304b\u3089\u30e9\u30a4\u30d6\u30e9\u30ea\u3092\u983b\u7e41\u306b\u843d\u3068\u3059\u3002\u3053\u3053\u306b\u4ed5\u639b\u3051\u308c\u3070\u3001\u74b0\u5883\u3054\u3068\u4e57\u3063\u53d6\u308c\u308b\u3002\u300d \u653b\u6483\u624b\u53e3 \u4eba\u6c17\u30e9\u30a4\u30d6\u30e9\u30ea\u3092\u507d\u88c5\u3057\u3066 PyPI \u306b\u516c\u958b LLM\u958b\u767a\u8005\u304c\u4f9d\u5b58\u95a2\u4fc2\u3092\u89e3\u6c7a\u3059\u308b\u3068\u81ea\u52d5\u3067\u53d6\u5f97 \u30de\u30eb\u30a6\u30a7\u30a2\u5165\u308a\u306e\u30e9\u30a4\u30d6\u30e9\u30ea\u304c\u7d44\u307f\u8fbc\u307e\u308c\u3001\u958b\u767a\u74b0\u5883\u3092\u4fb5\u5bb3 \u6210\u679c \u5b66\u7fd2\u30c7\u30fc\u30bf\u3084API\u30ad\u30fc\u306e\u7a83\u53d6 \u958b\u767a\u74b0\u5883\u5168\u4f53\u3092\u8db3\u304c\u304b\u308a\u306b\u6a2a\u5c55\u958b \u30b7\u30ca\u30ea\u30aa #2\uff1a\u6539\u3056\u3093\u6e08\u307f\u30e2\u30c7\u30eb\u306e\u516c\u958b\uff08Direct Tampering / PoisonGPT\uff09 \u653b\u6483\u8005\u306e\u767a\u60f3 \u300c\u30e2\u30c7\u30eb\u3092\u4e38\u3054\u3068\u6539\u2026","version":"1.0","url":"https://cysec148.hatenablog.com/entry/2025/08/26/150302","blog_title":"Shikata Ga Nai","published":"2025-08-26 15:03:02","author_name":"ThisIsOne","html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2Fcysec148.hatenablog.com%2Fentry%2F2025%2F08%2F26%2F150302\" title=\"\u3010\u6709\u6599\u8a66\u4f5c\u7248\u3011LLM03:2025 Supply Chain  \u30cf\u30c3\u30ab\u30fc\u8996\u70b9\u306e\u653b\u6483\u30b7\u30ca\u30ea\u30aa\u96c6 - Shikata Ga Nai\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>","categories":["OWASP TOP 10 for LLM"]}