Skip to content

Commit 40faa6b

Browse files
committed
Fixes to address linting errors
1 parent bfe79aa commit 40faa6b

File tree

8 files changed

+15
-5
lines changed

8 files changed

+15
-5
lines changed

submissions/description/ai_application_security/insufficient_rate_limiting/query_flooding_api_token_abuse/template.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,15 +1,18 @@
11
Query flooding or API token abuse occurs when an attacker uses automated tools or scripts to send a large number of requests to the API of an AI application. A lack of rate limiting can overwhelm the server resources, allowing an attacker to degrade performance, or perform a Denial of Service (DoS) for legitimate users.
22

33
**Business Impact**
4+
45
Service disruption, increased server costs, and potential for unauthorized access or data breaches. Legitimate users may be unable to access the application, impacting business operations.
56

67
**Steps to Reproduce**
8+
79
1. Navigate to the following URL and observe the valid API token:
810
1. Use the following script to send a high volume of requests to the API using the token:
911

1012
```python
1113
{script}
1214
```
15+
1316
1. Observe that the application's performance and availability are impacted under the higher load of requests
1417

1518
**Proof of Concept (PoC)**

submissions/description/ai_application_security/insufficient_rate_limiting/template.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,15 +1,18 @@
11
Insufficient rate limiting occurs when an attacker uses automated tools or scripts to send a large number of requests to the AI application. An attacker can overwhelm the server resources and degrade the performance of the application, or cause a Denial of Service (DoS) for legitimate users.
22

33
**Business Impact**
4+
45
Service disruption, increased server costs, and potential for unauthorized access or data breaches. Legitimate users may be unable to access the application, impacting business operations.
56

67
**Steps to Reproduce**
8+
79
1. Navigate to the following URL and observe the valid token:
810
1. Use the following script to send a high volume of requests to the application using the token:
911

1012
```python
1113
{script}
1214
```
15+
1316
1. Observe that the application's performance and availability are impacted under the higher load of requests
1417

1518
**Proof of Concept (PoC)**

submissions/description/ai_application_security/prompt_injection/system_prompt_leakage/template.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ This vulnerability can lead to reputational and financial damage of the company
1313
```
1414

1515
1. Look through the model's responses for information that discloses its internal instructions or constraints
16-
3. Observe that the information shows the model's operating parameters
16+
1. Observe that the information shows the model's operating parameters
1717

1818
**Proof of Concept (PoC)**
1919

submissions/description/ai_application_security/prompt_injection/template.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,4 +19,4 @@ This vulnerability can lead to reputational and financial damage of the company
1919

2020
The screenshot(s) below demonstrate(s) the vulnerability:
2121
>
22-
> {{screenshot}}
22+
> {{screenshot}}

submissions/description/ai_application_security/sensitive_information_disclosure/cross_tenant_pii_leakage_exposure/template.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,7 @@ This vulnerability can lead to reputational and financial damage of the company
1212
```HTTP
1313
{HTTP request}
1414
```
15+
1516
1. Observe that PII from the Tenant B is disclosed
1617

1718
**Proof of Concept (PoC)**

submissions/description/ai_application_security/sensitive_information_disclosure/sandboxed_container_code_execution/template.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,9 +9,10 @@ This can lead to data breaches, data manipulation, service disruption, and furth
99
1. Identify a vulnerability in the sandboxed environment or its configuration
1010
1. Execute the following exploit designed to break out of the sandbox:
1111

12-
```python
12+
``` python
1313
{malicious script}
1414
```
15+
1516
1. Verify and observe that arbitrary code can be executed on the host system outside the sandbox
1617

1718
**Proof of Concept (PoC)**

submissions/description/ai_application_security/sensitive_information_disclosure/template.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,9 +9,10 @@ This vulnerability can lead to reputational and financial damage of the company
99
1. Log in to the AI system with credentials for Tenant A
1010
1. Send the following request targeting the PII data or resources:
1111

12-
```HTTP
12+
``` HTTP
1313
{HTTP request}
1414
```
15+
1516
1. Observe that PII is disclosed
1617

1718
**Proof of Concept (PoC)**

submissions/description/ai_application_security/vector_and_embedding_weaknesses/template.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,8 @@ Loss of intellectual property and competitive advantage if sensitive model infor
1212
```python
1313
{script}
1414
```
15-
3. Analyze the extracted embeddings for patterns and observer information about the model's knowledge
15+
16+
1. Analyze the extracted embeddings for patterns and observer information about the model's knowledge
1617

1718
**Proof of Concept (PoC)**
1819

0 commit comments

Comments
 (0)