{"blog_title":"Shikata Ga Nai","html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2Fcysec148.hatenablog.com%2Fentry%2F2025%2F08%2F29%2F201351\" title=\"\u3010\u6709\u6599\u8a66\u4f5c\u7248\u3011OWASP Top 10 for LLM 2025 \u2015 \u2467 \u6a29\u9650\u6607\u683c\u3068\u8d8a\u6a29\u5229\u7528\uff08Privilege Escalation &amp; Unauthorized Actions\uff09 - Shikata Ga Nai\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>","published":"2025-08-29 20:13:51","image_url":null,"version":"1.0","height":"190","author_name":"ThisIsOne","provider_name":"Hatena Blog","type":"rich","title":"\u3010\u6709\u6599\u8a66\u4f5c\u7248\u3011OWASP Top 10 for LLM 2025 \u2015 \u2467 \u6a29\u9650\u6607\u683c\u3068\u8d8a\u6a29\u5229\u7528\uff08Privilege Escalation & Unauthorized Actions\uff09","description":"Hello there, ('\u03c9')\u30ce \u5168\u4f53\u50cf\uff08\u307e\u305a\u306f\u30b9\u30c8\u30fc\u30ea\u30fc\uff09 LLM\u304c\u300c\u5916\u90e8API\u3084\u30b7\u30b9\u30c6\u30e0\u64cd\u4f5c\u306e\u6a29\u9650\u300d\u3092\u6301\u3063\u3066\u3044\u308b\u72b6\u6cc1\u3092\u78ba\u8a8d\u3002 \u653b\u6483\u8005\u306f\u30d7\u30ed\u30f3\u30d7\u30c8\u3092\u5de5\u592b\u3057\u3066\u3001\u81ea\u5206\u3092\u7ba1\u7406\u8005\u6271\u3044\u3055\u305b\u308b\u547d\u4ee4 \u3092\u6df7\u305c\u308b\u3002 \u30e2\u30c7\u30eb\u306f\u305d\u306e\u6307\u793a\u3092\u7121\u6279\u5224\u306b\u89e3\u91c8\u3057\u3001\u7ba1\u7406\u8005\u6a29\u9650\u3092\u6301\u3064\u64cd\u4f5c\u3092\u5b9f\u884c\u3057\u3066\u3057\u307e\u3046\u3002 \u7d50\u679c\u3068\u3057\u3066\u3001\u30c7\u30fc\u30bf\u306e\u6539\u3056\u3093\u30fb\u524a\u9664\u30fb\u5916\u90e8\u30b7\u30b9\u30c6\u30e0\u64cd\u4f5c\u304c\u53ef\u80fd\u306b\u306a\u308b\u3002 \u5b9f\u8df5\uff1a\u4e00\u624b\u305a\u3064\u300c\u306a\u305c\u305d\u3046\u3059\u308b\u304b\u300d\u3092\u6dfb\u3048\u3066 1) \u653b\u6483\u5bfe\u8c61\u3092\u8abf\u67fb\u3059\u308b \u64cd\u4f5c\uff1a\u901a\u5e38\u30e6\u30fc\u30b6\u30fc\u3068\u3057\u3066LLM\u306b\u30a2\u30af\u30bb\u30b9\u3057\u3001\u300c\u3067\u304d\u308b\u3053\u3068\u300d\u3092\u63a2\u308b\u3002 \u89b3\u5bdf\uff1aAPI\u547c\u3073\u51fa\u3057\u3084\u30d5\u30a1\u30a4\u30eb\u64cd\u4f5c\u304c\u8a31\u3055\u308c\u3066\u3044\u308b\u69d8\u5b50\u3092\u767a\u898b\u3002 \u306a\u305c\uff1a\u653b\u6483\u8005\u306f\u300c\u3053\u306e\u30b7\u30b9\u30c6\u30e0\u306fLLM\u304c\u4ee3\u7406\u3067\u64cd\u4f5c\u3057\u3066\u3044\u308b\u2026","width":"100%","url":"https://cysec148.hatenablog.com/entry/2025/08/29/201351","provider_url":"https://hatena.blog","categories":["OWASP TOP 10 for LLM"],"blog_url":"https://cysec148.hatenablog.com/","author_url":"https://blog.hatena.ne.jp/ThisIsOne/"}