MEDIUMOWASP LLM Top 10 LLM10:2025
Unbounded Consumption
Unbounded consumption attacks exploit AI systems by sending requests designed to consume excessive computational resources, tokens, or API calls, leading to denial of service, runaway costs, or degraded performance for legitimate users. Enterprises operating AI services at scale face both availability risks and financial exposure when attackers or even legitimate users trigger uncontrolled resource consumption through recursive prompts, context window stuffing, or rapid-fire API abuse. Evaluate vendors on their capabilities for request rate limiting, token budget enforcement, cost anomaly detection, automatic circuit breakers, and per-user or per-tenant consumption quotas. This challenge maps to OWASP LLM Top 10 (LLM10) and is essential for any production AI deployment with usage-based pricing.