OfferP_IA
Securing your AI systems before they go live.
An offer dedicated to applications using LLMs, agents or RAG systems. We test the model, the data sealing, the tool chain, and governance. Approach based on OWASP Top 10 LLM and MITRE ATLAS.
↳ Duration
5 to 15 days
↳ Format
Custom
↳ Target
Vendors · IT depts
↳ Methodology
OWASP LLM · MITRE ATLAS
Three axes
From the user prompt to the training pipeline.
01
Model security
Prompt injection tests, guardrail bypass, model-mediated exfiltration, targeted jailbreak.
- ↳Prompt injection (direct & indirect)
- ↳Jailbreak & guardrail bypass
- ↳Exfiltration via outputs
- ↳Targeted hallucination
02
Data & RAG
RAG sealing, leakage of private documents, index poisoning, source-level access control.
- ↳RAG sealing
- ↳Document leakage
- ↳Poisoning
- ↳Access control
03
Architecture & supply chain
Architecture audit (orchestrators, agents, MCP), supply-chain security — models, datasets, dependencies.
- ↳Orchestrators & agents
- ↳MCP / external tools
- ↳Models & weights
- ↳Datasets & licences
Process
A clear process, from scoping to debrief.
01
Scoping
Use-case mapping, models used, accessible data.
02
Kickoff
Alignment on scope, access, constraints.
03
Testing
Prompt injection, exfiltration, RAG audit, supply-chain.
04
Debrief
Technical report, action plan, AI Act / NIST alignment.