Real-world exploits and mitigations in LLM applications (37c3)

Published --
Recommendations