Narok logo
OfferP_IA

Securing your AI systems before they go live.

An offer dedicated to applications using LLMs, agents or RAG systems. We test the model, the data sealing, the tool chain, and governance. Approach based on OWASP Top 10 LLM and MITRE ATLAS.

Duration
5 to 15 days
Format
Custom
Target
Vendors · IT depts
Methodology
OWASP LLM · MITRE ATLAS
Three axes

From the user prompt to the training pipeline.

01

Model security

Prompt injection tests, guardrail bypass, model-mediated exfiltration, targeted jailbreak.

  • Prompt injection (direct & indirect)
  • Jailbreak & guardrail bypass
  • Exfiltration via outputs
  • Targeted hallucination
02

Data & RAG

RAG sealing, leakage of private documents, index poisoning, source-level access control.

  • RAG sealing
  • Document leakage
  • Poisoning
  • Access control
03

Architecture & supply chain

Architecture audit (orchestrators, agents, MCP), supply-chain security — models, datasets, dependencies.

  • Orchestrators & agents
  • MCP / external tools
  • Models & weights
  • Datasets & licences
Process

A clear process, from scoping to debrief.

01
Scoping

Use-case mapping, models used, accessible data.

02
Kickoff

Alignment on scope, access, constraints.

03
Testing

Prompt injection, exfiltration, RAG audit, supply-chain.

04
Debrief

Technical report, action plan, AI Act / NIST alignment.