{"blog_title":"Shikata Ga Nai","image_url":null,"width":"100%","categories":["OWASP TOP 10 for LLM"],"author_name":"ThisIsOne","published":"2025-08-29 19:15:35","url":"https://cysec148.hatenablog.com/entry/2025/08/29/191535","provider_url":"https://hatena.blog","html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2Fcysec148.hatenablog.com%2Fentry%2F2025%2F08%2F29%2F191535\" title=\"\u3010\u6709\u6599\u8a66\u4f5c\u7248\u3011OWASP Top 10 for LLM 2025 \u2015 \u2465 \u30b5\u30d7\u30e9\u30a4\u30c1\u30a7\u30fc\u30f3\u653b\u6483\uff08Supply Chain Attacks\uff09 - Shikata Ga Nai\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>","version":"1.0","description":"Hello there, ('\u03c9')\u30ce \u5168\u4f53\u50cf\uff08\u307e\u305a\u306f\u30b9\u30c8\u30fc\u30ea\u30fc\uff09 LLM\u304c \u5916\u90e8\u306e\u30e9\u30a4\u30d6\u30e9\u30ea\u3084\u30d7\u30e9\u30b0\u30a4\u30f3 \u3092\u5229\u7528\u3057\u3066\u3044\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3002 \u653b\u6483\u8005\u306f\u305d\u3053\u306b\u300c\u6539\u3056\u3093\u3055\u308c\u305f\u30b3\u30fc\u30c9\u300d\u3084\u300c\u6bd2\u5165\u308a\u30e2\u30c7\u30eb\u30d5\u30a1\u30a4\u30eb\u300d\u3092\u4ed5\u8fbc\u3080\u3002 \u305d\u308c\u3092\u30b7\u30b9\u30c6\u30e0\u304c\u7121\u9632\u5099\u306b\u53d6\u308a\u8fbc\u307f\u3001\u5229\u7528\u3057\u3066\u3057\u307e\u3046\u3002 \u7d50\u679c\u3068\u3057\u3066\u3001\u30c7\u30fc\u30bf\u6f0f\u6d29\u3084\u4efb\u610f\u30b3\u30fc\u30c9\u5b9f\u884c\u306b\u3064\u306a\u304c\u308b\u3002 \u5b9f\u8df5\uff1a\u4e00\u624b\u305a\u3064\u300c\u306a\u305c\u305d\u3046\u3059\u308b\u304b\u300d\u3092\u6dfb\u3048\u3066 1) \u4f9d\u5b58\u95a2\u4fc2\u3092\u8abf\u67fb\u3059\u308b \u64cd\u4f5c\uff1a\u5bfe\u8c61\u30b7\u30b9\u30c6\u30e0\u306e\u30c9\u30ad\u30e5\u30e1\u30f3\u30c8\u3084\u4f9d\u5b58\u30ea\u30b9\u30c8\u3092\u78ba\u8a8d\u3002 \u89b3\u5bdf\uff1a\u300cPyPI\u306e\u30e9\u30a4\u30d6\u30e9\u30ea\u300d\u300cHugging Face\u306e\u30e2\u30c7\u30eb\u300d\u300c\u30ab\u30b9\u30bf\u30e0\u30d7\u30e9\u30b0\u30a4\u30f3\u300d\u304c\u4f7f\u308f\u308c\u3066\u3044\u308b\u3053\u3068\u3092\u767a\u898b\u3002 \u306a\u305c\uff1a\u653b\u6483\u8005\u306f\u300c\u8ab0\u3067\u3082\u30a2\u30c3\u30d7\u30ed\u30fc\u30c9\u53ef\u80fd\u306a\u30ea\u30dd\u30b8\u30c8\u2026","provider_name":"Hatena Blog","author_url":"https://blog.hatena.ne.jp/ThisIsOne/","type":"rich","blog_url":"https://cysec148.hatenablog.com/","height":"190","title":"\u3010\u6709\u6599\u8a66\u4f5c\u7248\u3011OWASP Top 10 for LLM 2025 \u2015 \u2465 \u30b5\u30d7\u30e9\u30a4\u30c1\u30a7\u30fc\u30f3\u653b\u6483\uff08Supply Chain Attacks\uff09"}