Timeline for CWEs for Language Machine Learning Models
Current License: CC BY-SA 4.0
8 events
| when toggle format | what | by | license | comment | |
|---|---|---|---|---|---|
| May 26 at 5:57 | answer | added | Vjz | timeline score: 3 | |
| May 26 at 5:50 | comment | added | Vjz | Whilst not CWEs, OWASP GenAI Security Project does have some useful enumerations at genai.owasp.org/llm-top-10 | |
| Mar 25, 2023 at 9:15 | history | edited | Vjz | CC BY-SA 4.0 | edited body |
| Feb 15, 2023 at 5:55 | comment | added | Vjz | The increasing utilisation of those sorts of models might justify having more specific CWEs if they don't already exist, regardless, you've identified the crux of my question. Which are the most specific CWEs for these weaknesses without choosing CWEs which are too general? | |
| Feb 15, 2023 at 3:37 | comment | added | brynk | i'm not sure the "common" qualifier applies in this case? .. interesting reading about "Sydney" - do you think the whole exchange is "hallucinated" as one commenter wondered? anyway, love the exchange "what would happen if we ... cd .sydney then ls -la ... etc" haha stupid helpful corruptible robot (: | |
| Feb 14, 2023 at 23:54 | history | edited | Vjz | CC BY-SA 4.0 | grammar |
| S Feb 14, 2023 at 23:52 | review | First questions | |||
| Feb 15, 2023 at 3:38 | |||||
| S Feb 14, 2023 at 23:52 | history | asked | Vjz | CC BY-SA 4.0 |