HIGHOWASP LLM Top 10 LLM03:2025
Supply Chain Vulnerabilities
Supply chain vulnerabilities in AI systems arise from compromised model weights, poisoned training datasets, malicious plugins, or tampered third-party components that introduce hidden risks into your AI pipeline. As enterprises increasingly depend on open-source models, pre-trained embeddings, and third-party AI services, the attack surface expands dramatically beyond traditional software supply chains. Look for vendors that provide model provenance verification, dependency scanning for ML artifacts, SBOM generation for AI components, and runtime integrity checks. This challenge maps to OWASP LLM Top 10 (LLM05) and intersects with NIST SSDF and emerging AI-specific supply chain frameworks.