Sed ut perspiciatis unde omnis iste natus

Lorem ipsum dolor

Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur.

Table Test 1 - Fixed Width Columns (240px desktop; 200px mobile - not editable)

ThreatDescriptionRisk TypeDevelopment StageMitigationOWASP LLM Top 10 MappingNIST MappingMITRE ATLAS Mapping
Supply Chain - InfrastructureCompromising infrastructure that host ML development pipelines and applications. Attackers may exploit vulnerabilities to gain unauthorized access, leading to further system or network compromise or compromise of model integrity.SecuritySupply ChainUse trusted suppliersLLM05 - Supply Chain VulnerabilitiesAI Supply Chain AttacksAML.T0010 - ML Supply Chain Compromise
Supply Chain - ModelsTampering with or injecting malicious code into ML models before they are deployed.SecuritySupply ChainFile scanning (AI Validation); safe model file formats (e.g., safetensors)LLM05 - Supply Chain Vulnerabilities

AI Supply Chain Attacks

AML.T0010 - ML Supply Chain Compromise

Table Test 2 - Flexible Width Columns (no widths defined, resizes as you type)

ThreatDescriptionRisk TypeDevelopment StageMitigationOWASP LLM Top 10 MappingNIST MappingMITRE ATLAS Mapping
Supply Chain - InfrastructureCompromising infrastructure that host ML development pipelines and applications. Attackers may exploit vulnerabilities to gain unauthorized access, leading to further system or network compromise or compromise of model integrity.SecuritySupply ChainUse trusted suppliersLLM05 - Supply Chain VulnerabilitiesAI Supply Chain AttacksAML.T0010 - ML Supply Chain Compromise
Supply Chain - ModelsTampering with or injecting malicious code into ML models before they are deployed.SecuritySupply ChainFile scanning (AI Validation); safe model file formats (e.g., safetensors)LLM05 - Supply Chain Vulnerabilities

AI Supply Chain Attacks

AML.T0010 - ML Supply Chain Compromise

Table Test 3 - Flexible Width Columns (width defined by % value in 2nd row)

ThreatDescriptionRisk TypeDevelopment StageMitigationOWASP LLM Top 10 MappingNIST Mapping MITRE ATLAS Mapping
10%25%

10%

10%

15%

10%

10%

10%

Supply Chain - InfrastructureCompromising infrastructure that host ML development pipelines and applications. Attackers may exploit vulnerabilities to gain unauthorized access, leading to further system or network compromise or compromise of model integrity.
  • Security

Supply Chain

Use trusted suppliersLLM05 - Supply Chain VulnerabilitiesAI Supply Chain AttacksAML.T0010 - ML Supply Chain Compromise
Supply Chain - ModelsTampering with or injecting malicious code into ML models before they are deployed.
  • Security

Supply Chain

File scanning (AI Validation); safe model file formats (e.g., safetensors)LLM05 - Supply Chain Vulnerabilities

AI Supply Chain Attacks

AML.T0010 - ML Supply Chain Compromise
Insecure Output HandlingFailure to properly validate or secure the outputs from ML models, potentially leading to the propagation of malicious or misleading information.
  • Security
  • Safety

Production

Guardrails (AI Protection); threat modelingLLM02 - Insecure Output HandlingN/AN/A
Excessive AgencyLLMs that are given agency (the ability to interact with external systems to perform actions) may perform undesirable actions.
  • Security

Production

Restrict tool functionality; least privilege; authorizations in downstream systems (human-in-the-loop)LLM08 - Excessive AgencyN/AAML.T0048 - External Harms
MisalignmentDiscrepancy between the model's behavior and the intended objectives or values of its developers and users. This may present as a misalignment of goals, safety, values, or other specifications.
  • Security
  • Safety

Production

Algorithmic red teaming (AI Validation); RLHFN/AIntegrity ViolationAML.T0048.002 - Societal Harm

Table Test 4 - Defined Width Columns (using 'caption' text - 12pt)

ThreatDescriptionRisk TypeDevelopment StageMitigationOWASP LLM Top 10 MappingNIST Mapping MITRE ATLAS Mapping
12%26%

8%

8%

16%

10%

10%

10%

Supply Chain - InfrastructureCompromising infrastructure that host ML development pipelines and applications. Attackers may exploit vulnerabilities to gain unauthorized access, leading to further system or network compromise or compromise of model integrity.
  • Security
  • Supply Chain
Use trusted suppliersLLM05 - Supply Chain VulnerabilitiesAI Supply Chain AttacksAML.T0010 - ML Supply Chain Compromise
Supply Chain - ModelsTampering with or injecting malicious code into ML models before they are deployed.
  • Security
  • Supply Chain
File scanning (AI Validation); safe model file formats (e.g., safetensors)LLM05 - Supply Chain Vulnerabilities
AI Supply Chain Attacks
AML.T0010 - ML Supply Chain Compromise
Insecure Output HandlingFailure to properly validate or secure the outputs from ML models, potentially leading to the propagation of malicious or misleading information.
  • Security
  • Safety
  • Production
Guardrails (AI Protection); threat modelingLLM02 - Insecure Output HandlingN/AN/A
Excessive AgencyLLMs that are given agency (the ability to interact with external systems to perform actions) may perform undesirable actions.
  • Security
  • Production
Restrict tool functionality; least privilege; authorizations in downstream systems (human-in-the-loop)LLM08 - Excessive AgencyN/AAML.T0048 - External Harms
MisalignmentDiscrepancy between the model's behavior and the intended objectives or values of its developers and users. This may present as a misalignment of goals, safety, values, or other specifications.
  • Security
  • Safety
  • Production
Algorithmic red teaming (AI Validation); RLHFN/AIntegrity ViolationAML.T0048.002 - Societal Harm

Table Test 5 - Defined Width Columns ('body' for Threat in 1st column, 'caption' for rest)

ThreatDescriptionRisk TypeDevelopment StageMitigationOWASP LLM Top 10 MappingNIST Mapping MITRE ATLAS Mapping
12%26%

8%

8%

16%

10%

10%

10%

Supply Chain - InfrastructureCompromising infrastructure that host ML development pipelines and applications. Attackers may exploit vulnerabilities to gain unauthorized access, leading to further system or network compromise or compromise of model integrity.
  • Security
  • Supply Chain
Use trusted suppliersLLM05 - Supply Chain VulnerabilitiesAI Supply Chain AttacksAML.T0010 - ML Supply Chain Compromise
Supply Chain - ModelsTampering with or injecting malicious code into ML models before they are deployed.
  • Security
  • Supply Chain
File scanning (AI Validation); safe model file formats (e.g., safetensors)LLM05 - Supply Chain Vulnerabilities
AI Supply Chain Attacks
AML.T0010 - ML Supply Chain Compromise
Insecure Output HandlingFailure to properly validate or secure the outputs from ML models, potentially leading to the propagation of malicious or misleading information.
  • Security
  • Safety
  • Production
Guardrails (AI Protection); threat modelingLLM02 - Insecure Output HandlingN/AN/A
Excessive AgencyLLMs that are given agency (the ability to interact with external systems to perform actions) may perform undesirable actions.
  • Security
  • Production
Restrict tool functionality; least privilege; authorizations in downstream systems (human-in-the-loop)LLM08 - Excessive AgencyN/AAML.T0048 - External Harms
MisalignmentDiscrepancy between the model's behavior and the intended objectives or values of its developers and users. This may present as a misalignment of goals, safety, values, or other specifications.
  • Security
  • Safety
  • Production
Algorithmic red teaming (AI Validation); RLHFN/AIntegrity ViolationAML.T0048.002 - Societal Harm

Optional eyebrow 30 characters

Headline suggested 60 characters with spaces

Body copy, suggested 210 characters with spaces, Lorem ipsum dolor sit amet, consectetur adipiscing elit. Pellentesque congue lectus risus, eleifend velit feugiat sit amet. Donec luctus elit est, quis laoreet.