LLM03 - Supply Chain
Vulnerability
Introducing risks via compromised models, datasets, or third-party integrations in the AI development pipeline.
Mitigation Strategies
- Conduct model and agent discovery to identify sanctioned and shadow AI.
- Use model cards to evaluate risks like bias, toxicity, and misconfigurations in third-party components.
- Conduct third-party risk assessments for all supplier components to proactively identify vulnerabilities.
Example: Pre-trained models and poisoned datasets can introduce biases, backdoors, and vulnerabilities, enabling data theft, system compromise, and harmful content generation.
Learn More