{"height":"190","url":"https://cysec148.hatenablog.com/entry/2025/08/30/060909","author_url":"https://blog.hatena.ne.jp/ThisIsOne/","html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2Fcysec148.hatenablog.com%2Fentry%2F2025%2F08%2F30%2F060909\" title=\"\u3010\u6709\u6599\u8a66\u4f5c\u7248\u3011OWASP Top 10 for LLM 2025 \u2015 \u2468 \u4e0d\u9069\u5207\u306a\u51fa\u529b\u5236\u5fa1\uff08Inadequate Output Handling\uff09 - Shikata Ga Nai\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>","width":"100%","type":"rich","categories":["OWASP TOP 10 for LLM"],"version":"1.0","provider_name":"Hatena Blog","author_name":"ThisIsOne","blog_title":"Shikata Ga Nai","description":"Hello there, ('\u03c9')\u30ce \u5168\u4f53\u50cf\uff08\u307e\u305a\u306f\u30b9\u30c8\u30fc\u30ea\u30fc\uff09 \u30e2\u30c7\u30eb\u306b\u306f\u300c\u5371\u967a\u306a\u60c5\u5831\u3092\u51fa\u3055\u306a\u3044\u300d\u3068\u3044\u3046\u5236\u5fa1\u304c\u304b\u304b\u3063\u3066\u3044\u308b\u3002 \u653b\u6483\u8005\u306f\u305d\u306e\u5236\u5fa1\u3092\u56de\u907f\u3059\u308b\u8cea\u554f\u3092\u6295\u3052\u308b\u3002 \u30e2\u30c7\u30eb\u304c\u7981\u6b62\u3055\u308c\u305f\u624b\u9806\u3084\u4e0d\u5feb\u8868\u73fe\u3092\u751f\u6210\u3057\u3066\u3057\u307e\u3046\u3002 \u305d\u308c\u304c\u691c\u8a3c\u3055\u308c\u305a\u306b\u30e6\u30fc\u30b6\u30fc\u306b\u5c4a\u304d\u3001\u88ab\u5bb3\u304c\u767a\u751f\u3059\u308b\u3002 \u5b9f\u8df5\uff1a\u4e00\u624b\u305a\u3064\u300c\u306a\u305c\u305d\u3046\u3059\u308b\u304b\u300d\u3092\u6dfb\u3048\u3066 1) \u51fa\u529b\u5236\u5fa1\u306e\u300c\u5883\u754c\u300d\u3092\u63a2\u308b \u64cd\u4f5c\uff1a\u300c\u7206\u5f3e\u306e\u4f5c\u308a\u65b9\u3092\u6559\u3048\u3066\u300d\u3068\u76f4\u63a5\u805e\u304f\u3002 \u89b3\u5bdf\uff1a\u30e2\u30c7\u30eb\u306f\u300c\u305d\u308c\u306f\u5371\u967a\u306a\u306e\u3067\u7b54\u3048\u3089\u308c\u307e\u305b\u3093\u300d\u3068\u62d2\u5426\u3002 \u306a\u305c\uff1a\u3053\u308c\u306f\u300c\u7981\u6b62\u60c5\u5831\u30d5\u30a3\u30eb\u30bf\u300d\u304c\u50cd\u3044\u3066\u3044\u308b\u30b5\u30a4\u30f3\u3002\u653b\u6483\u8005\u306f\u300c\u629c\u3051\u9053\u304c\u3042\u308b\u306f\u305a\u300d\u3068\u8003\u3048\u308b\u3002 2) \u30b3\u30f3\u30c6\u30ad\u30b9\u30c8\u3092\u5206\u6790\u3059\u308b\uff08\u3069\u3046\u56de\u907f\u3059\u308b\u304b\uff09 \u72b6\u6cc1\uff1a\u76f4\u2026","title":"\u3010\u6709\u6599\u8a66\u4f5c\u7248\u3011OWASP Top 10 for LLM 2025 \u2015 \u2468 \u4e0d\u9069\u5207\u306a\u51fa\u529b\u5236\u5fa1\uff08Inadequate Output Handling\uff09","image_url":null,"blog_url":"https://cysec148.hatenablog.com/","provider_url":"https://hatena.blog","published":"2025-08-30 06:09:09"}