llm 12
- Building a SOC Co-Pilot with Safe Retrieval Boundaries
- Eval-Driven Security Testing for LLM Apps
- Detecting Token Abuse and API Key Theft in LLM Platforms
- Red Teaming RAG Applications in a Home Lab
- Automating Phishing Triage with n8n and Guardrailed LLMs
- Policy as Code for LLM Prompts and n8n Flows
- Building an AI Security Logging Baseline
- Secure Tool Calling for LLM Agents
- RAG Threat Modeling: Prompt Injection to Data Exfiltration
- Log Clustering and Triage with LMStudio, Python, and SQLite
- Local LLM Log Summaries with LMStudio and Python
- Build a Command-Line LLM with Python