<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>LLM on Medusa0xf</title>
    <link>https://medusa0xf.com/tags/llm/</link>
    <description>Recent content in LLM on Medusa0xf</description>
    <generator>Hugo -- gohugo.io</generator>
    <language>en</language>
    <copyright>© 2026 Medusa0xf</copyright>
    <lastBuildDate>Sun, 21 Jul 2024 12:42:00 +0100</lastBuildDate><atom:link href="https://medusa0xf.com/tags/llm/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Exploiting insecure output handling in LLMs</title>
      <link>https://medusa0xf.com/posts/exploiting-insecure-output-handling-in-llms/</link>
      <pubDate>Sun, 21 Jul 2024 12:42:00 +0100</pubDate>
      
      <guid>https://medusa0xf.com/posts/exploiting-insecure-output-handling-in-llms/</guid>
      <description>Introduction #In the previous blog, I discussed indirect prompt injection and its potential applications.</description>
      <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://medusa0xf.com/posts/exploiting-insecure-output-handling-in-llms/featured.png" />
    </item>
    
    <item>
      <title>Indirect prompt injection</title>
      <link>https://medusa0xf.com/posts/indirect-prompt-injection/</link>
      <pubDate>Sun, 14 Jul 2024 12:04:37 +0100</pubDate>
      
      <guid>https://medusa0xf.com/posts/indirect-prompt-injection/</guid>
      <description>Learn about the risks and techniques of indirect prompt injection in Large Language Models (LLMs).</description>
      <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://medusa0xf.com/posts/indirect-prompt-injection/featured.gif" />
    </item>
    
    <item>
      <title>Exploiting vulnerabilities in LLM APIs</title>
      <link>https://medusa0xf.com/posts/exploiting-vulnerabilities-in-llm-apis/</link>
      <pubDate>Sat, 29 Jun 2024 22:34:07 +0100</pubDate>
      
      <guid>https://medusa0xf.com/posts/exploiting-vulnerabilities-in-llm-apis/</guid>
      <description>What is OS command injection?</description>
      <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://medusa0xf.com/posts/exploiting-vulnerabilities-in-llm-apis/featured.png" />
    </item>
    
    <item>
      <title>Exploiting LLM APIs with excessive agency</title>
      <link>https://medusa0xf.com/posts/exploiting-llm-apis-with-excessive-agency/</link>
      <pubDate>Sat, 22 Jun 2024 23:04:07 +0100</pubDate>
      
      <guid>https://medusa0xf.com/posts/exploiting-llm-apis-with-excessive-agency/</guid>
      <description>What is Excessive Agency in LLM API?</description>
      <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://medusa0xf.com/posts/exploiting-llm-apis-with-excessive-agency/featured.png" />
    </item>
    
    <item>
      <title>What is LLM APIs and how they work?</title>
      <link>https://medusa0xf.com/posts/what-is-llm-apis-and-how-they-work/</link>
      <pubDate>Tue, 18 Jun 2024 15:04:37 +0100</pubDate>
      
      <guid>https://medusa0xf.com/posts/what-is-llm-apis-and-how-they-work/</guid>
      <description>What is an LLM API?</description>
      <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://medusa0xf.com/posts/what-is-llm-apis-and-how-they-work/featured.jpg" />
    </item>
    
  </channel>
</rss>
