|
16 | 16 | "value": "no-store, no-cache, max-age=0, must-revalidate" |
17 | 17 | } |
18 | 18 | ] |
| 19 | + }, |
| 20 | + { |
| 21 | + "source": "/goto/**", |
| 22 | + "headers": [ |
| 23 | + { |
| 24 | + "key": "Cache-Control", |
| 25 | + "value": "no-store, no-cache, max-age=0, must-revalidate" |
| 26 | + } |
| 27 | + ] |
19 | 28 | } |
20 | 29 | ], |
21 | 30 | "redirects": [ |
| 31 | + { |
| 32 | + "source": "/goto/media/", |
| 33 | + "destination": "/media", |
| 34 | + "type": 302 |
| 35 | + }, |
22 | 36 | { |
23 | 37 | "source": "/go/media/", |
24 | 38 | "destination": "/media", |
|
29 | 43 | "destination": "/docs/ai_security_overview/#table-of-contents", |
30 | 44 | "type": 302 |
31 | 45 | }, |
| 46 | + { |
| 47 | + "source": "/goto/summary/", |
| 48 | + "destination": "/docs/ai_security_overview/#how-to-organize-ai-security", |
| 49 | + "type": 302 |
| 50 | + }, |
32 | 51 | { |
33 | 52 | "source": "/go/summary/", |
34 | 53 | "destination": "/docs/ai_security_overview/#how-to-organize-ai-security", |
|
44 | 63 | "destination": "/docs/ai_security_overview/#how-to-organize-ai-security", |
45 | 64 | "type": 302 |
46 | 65 | }, |
| 66 | + { |
| 67 | + "source": "/goto/essentials/", |
| 68 | + "destination": "/docs/ai_security_overview/#ai-security-essentials", |
| 69 | + "type": 302 |
| 70 | + }, |
47 | 71 | { |
48 | 72 | "source": "/go/essentials/", |
49 | 73 | "destination": "/docs/ai_security_overview/#ai-security-essentials", |
50 | 74 | "type": 302 |
51 | 75 | }, |
| 76 | + { |
| 77 | + "source": "/goto/threatsoverview/", |
| 78 | + "destination": "/docs/ai_security_overview/#threats-overview", |
| 79 | + "type": 302 |
| 80 | + }, |
52 | 81 | { |
53 | 82 | "source": "/go/threatsoverview/", |
54 | 83 | "destination": "/docs/ai_security_overview/#threats-overview", |
55 | 84 | "type": 302 |
56 | 85 | }, |
| 86 | + { |
| 87 | + "source": "/goto/agenticaithreats/", |
| 88 | + "destination": "/docs/ai_security_overview/#threats-to-agentic-ai", |
| 89 | + "type": 302 |
| 90 | + }, |
57 | 91 | { |
58 | 92 | "source": "/go/agenticaithreats/", |
59 | 93 | "destination": "/docs/ai_security_overview/#threats-to-agentic-ai", |
60 | 94 | "type": 302 |
61 | 95 | }, |
| 96 | + { |
| 97 | + "source": "/goto/aisecuritymatrix/", |
| 98 | + "destination": "/docs/ai_security_overview/#ai-security-matrix", |
| 99 | + "type": 302 |
| 100 | + }, |
62 | 101 | { |
63 | 102 | "source": "/go/aisecuritymatrix/", |
64 | 103 | "destination": "/docs/ai_security_overview/#ai-security-matrix", |
|
69 | 108 | "destination": "/docs/ai_security_overview/#ai-security-matrix", |
70 | 109 | "type": 302 |
71 | 110 | }, |
| 111 | + { |
| 112 | + "source": "/goto/controlsoverview/", |
| 113 | + "destination": "/docs/ai_security_overview/#controls-overview", |
| 114 | + "type": 302 |
| 115 | + }, |
72 | 116 | { |
73 | 117 | "source": "/go/controlsoverview/", |
74 | 118 | "destination": "/docs/ai_security_overview/#controls-overview", |
|
79 | 123 | "destination": "/docs/ai_security_overview/#threat-model-with-controls---ready-made-model", |
80 | 124 | "type": 302 |
81 | 125 | }, |
| 126 | + { |
| 127 | + "source": "/goto/periodictable/", |
| 128 | + "destination": "/docs/ai_security_overview/#periodic-table-of-ai-security", |
| 129 | + "type": 302 |
| 130 | + }, |
82 | 131 | { |
83 | 132 | "source": "/go/periodictable/", |
84 | 133 | "destination": "/docs/ai_security_overview/#periodic-table-of-ai-security", |
85 | 134 | "type": 302 |
86 | 135 | }, |
| 136 | + { |
| 137 | + "source": "/goto/navigator/", |
| 138 | + "destination": "/docs/ai_security_overview/#structure-of-threats-and-controls-in-the-deep-dive-section", |
| 139 | + "type": 302 |
| 140 | + }, |
87 | 141 | { |
88 | 142 | "source": "/go/navigator/", |
89 | 143 | "destination": "/docs/ai_security_overview/#structure-of-threats-and-controls-in-the-deep-dive-section", |
90 | 144 | "type": 302 |
91 | 145 | }, |
| 146 | + { |
| 147 | + "source": "/goto/about/", |
| 148 | + "destination": "/docs/ai_security_overview/#about-the-ai-exchange", |
| 149 | + "type": 302 |
| 150 | + }, |
92 | 151 | { |
93 | 152 | "source": "/go/about/", |
94 | 153 | "destination": "/docs/ai_security_overview/#about-the-ai-exchange", |
95 | 154 | "type": 302 |
96 | 155 | }, |
| 156 | + { |
| 157 | + "source": "/goto/aiatowasp/", |
| 158 | + "destination": "/docs/ai_security_overview/#relevant-owasp-ai-initiatives", |
| 159 | + "type": 302 |
| 160 | + }, |
97 | 161 | { |
98 | 162 | "source": "/go/aiatowasp/", |
99 | 163 | "destination": "/docs/ai_security_overview/#relevant-owasp-ai-initiatives", |
100 | 164 | "type": 302 |
101 | 165 | }, |
| 166 | + { |
| 167 | + "source": "/goto/document/", |
| 168 | + "destination": "/docs/ai_security_overview/#how-to-use-this-document", |
| 169 | + "type": 302 |
| 170 | + }, |
102 | 171 | { |
103 | 172 | "source": "/go/document/", |
104 | 173 | "destination": "/docs/ai_security_overview/#how-to-use-this-document", |
105 | 174 | "type": 302 |
106 | 175 | }, |
| 176 | + { |
| 177 | + "source": "/goto/riskanalysis/", |
| 178 | + "destination": "/docs/ai_security_overview/#how-to-select-relevant-threats-and-controls-risk-analysis", |
| 179 | + "type": 302 |
| 180 | + }, |
107 | 181 | { |
108 | 182 | "source": "/go/riskanalysis/", |
109 | 183 | "destination": "/docs/ai_security_overview/#how-to-select-relevant-threats-and-controls-risk-analysis", |
|
129 | 203 | "destination": "/docs/ai_security_overview/#how-about-copyright", |
130 | 204 | "type": 302 |
131 | 205 | }, |
| 206 | + { |
| 207 | + "source": "/goto/references/", |
| 208 | + "destination": "/docs/ai_security_references/", |
| 209 | + "type": 302 |
| 210 | + }, |
132 | 211 | { |
133 | 212 | "source": "/go/references/", |
134 | 213 | "destination": "/docs/ai_security_references/", |
|
214 | 293 | "destination": "/docs/1_general_controls/#13-controls-to-limit-the-effects-of-unwanted-behaviour", |
215 | 294 | "type": 302 |
216 | 295 | }, |
| 296 | + { |
| 297 | + "source": "/goto/oversight/", |
| 298 | + "destination": "/docs/1_general_controls/#oversight", |
| 299 | + "type": 302 |
| 300 | + }, |
217 | 301 | { |
218 | 302 | "source": "/go/oversight/", |
219 | 303 | "destination": "/docs/1_general_controls/#oversight", |
220 | 304 | "type": 302 |
221 | 305 | }, |
| 306 | + { |
| 307 | + "source": "/goto/leastmodelprivilege/", |
| 308 | + "destination": "/docs/1_general_controls/#least-model-privilege", |
| 309 | + "type": 302 |
| 310 | + }, |
222 | 311 | { |
223 | 312 | "source": "/go/leastmodelprivilege/", |
224 | 313 | "destination": "/docs/1_general_controls/#least-model-privilege", |
|
364 | 453 | "destination": "/docs/2_threats_through_use/#221-direct-prompt-injection", |
365 | 454 | "type": 302 |
366 | 455 | }, |
| 456 | + { |
| 457 | + "source": "/goto/promptinjectionsevenlayers/", |
| 458 | + "destination": "/docs/2_threats_through_use/#seven-layers-of-prompt-injection-protection", |
| 459 | + "type": 302 |
| 460 | + }, |
367 | 461 | { |
368 | 462 | "source": "/go/promptinjectionsevenlayers/", |
369 | 463 | "destination": "/docs/2_threats_through_use/#seven-layers-of-prompt-injection-protection", |
|
379 | 473 | "destination": "/docs/2_threats_through_use/#prompt-injection-io-handling", |
380 | 474 | "type": 302 |
381 | 475 | }, |
| 476 | + { |
| 477 | + "source": "/goto/promptinjectioniohandling/", |
| 478 | + "destination": "/docs/2_threats_through_use/#prompt-injection-io-handling", |
| 479 | + "type": 302 |
| 480 | + }, |
382 | 481 | { |
383 | 482 | "source": "/go/promptinjectioniohandling/", |
384 | 483 | "destination": "/docs/2_threats_through_use/#prompt-injection-io-handling", |
|
654 | 753 | "destination": "/docs/4_runtime_application_security_threats/#encode-model-output", |
655 | 754 | "type": 302 |
656 | 755 | }, |
| 756 | + { |
| 757 | + "source": "/goto/leakinput/", |
| 758 | + "destination": "/docs/4_runtime_application_security_threats/#45-input-data-leak", |
| 759 | + "type": 302 |
| 760 | + }, |
657 | 761 | { |
658 | 762 | "source": "/go/leakinput/", |
659 | 763 | "destination": "/docs/4_runtime_application_security_threats/#45-input-data-leak", |
|
0 commit comments