{"id":231375,"date":"2026-01-28T16:55:40","date_gmt":"2026-01-28T16:55:40","guid":{"rendered":"https:\/\/www.intrinsec.com\/?p=231375"},"modified":"2026-03-10T17:36:05","modified_gmt":"2026-03-10T17:36:05","slug":"audit-securite-des-llm","status":"publish","type":"post","link":"https:\/\/www.intrinsec.com\/en\/audit-securite-des-llm\/","title":{"rendered":"Auditing the security of LLMs"},"content":{"rendered":"<p>Large Language Models (LLMs) are becoming a standard component of information systems, but very few organizations have yet integrated these technologies into their technical auditing and penetration testing practices. This article proposes a forward-looking approach.&nbsp;<strong><a href=\"https:\/\/www.intrinsec.com\/en\/audit-cybersecurite\/\">cyber audit<\/a><\/strong>,&nbsp;<strong><a href=\"https:\/\/www.intrinsec.com\/en\/test-intrusion\/\">pentesting<\/a><\/strong>&nbsp;And&nbsp;<strong><a href=\"https:\/\/www.intrinsec.com\/en\/red-team-cybersecurite\/\">offensive security<\/a><\/strong>&nbsp;to concretely assess the risks associated with LLMs, without limiting oneself to a simple theoretical review of the <a href=\"https:\/\/owasp.org\/Top10\/2025\/\">OWASP Top 10<\/a>.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-1-pourquoi-les-llm-bouleversent-l-audit-technique\">1. Why are LLMs revolutionizing technical auditing?<\/h2>\n\n\n\n<p>LLMs are not like a &quot;simple&quot; web service: they combine a statistical model, opaque training data, complex prompts, business connectors, and sometimes agents capable of executing actions. In a cybersecurity audit context, this means that the attack surface covers the front end, the APIs, the orchestration engine, the model, and the MLOps pipelines that feed it.<\/p>\n\n\n\n<p>For a team of&nbsp;<strong>security<\/strong>&nbsp;or&nbsp;<strong><a href=\"https:\/\/www.intrinsec.com\/en\/test-intrusion\/\">pentesting<\/a><\/strong>, The impacts are tangible:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Penetration testing can no longer stop at the interface: it is also necessary to test the prompt logic, the knowledge sources, the tools and the automated workflows.<\/li>\n\n\n\n<li>Traditional risks (XSS, injections, data exfiltration) are combined with new scenarios specific to generative AI:&nbsp;<strong>poisoning<\/strong>,&nbsp;<strong>model theft<\/strong>&nbsp;(Or&nbsp;<strong>model extraction<\/strong>) And&nbsp;<strong>adversarial attacks<\/strong>.<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-2-nouveaux-risques-et-cadres-de-reference\">2. New risks and reference frameworks<\/h2>\n\n\n\n<p>The arrival of LLM necessitates a reinterpretation of existing security standards. Frameworks such as the\u2019<strong><a href=\"https:\/\/owasp.org\/www-project-top-10-for-large-language-model-applications\/\" type=\"link\" id=\"https:\/\/owasp.org\/www-project-top-10-for-large-language-model-applications\/\">OWASP Top 10 for LLM Applications<\/a><\/strong>, THE\u00a0<strong><a href=\"https:\/\/www.nist.gov\/itl\/ai-risk-management-framework\" type=\"link\" id=\"https:\/\/www.nist.gov\/itl\/ai-risk-management-framework\">NIST AI RMF<\/a><\/strong>\u00a0or the recommendations of the\u2019<strong>ANSSI<\/strong>\u00a0constitute a useful working basis, but insufficient to cover all operational risks related to orchestration, prompts and MLOps pipelines.<br>An effective LLM audit must therefore combine\u00a0<strong><a href=\"https:\/\/www.intrinsec.com\/en\/conformite-cadres-reglementaires\/\">compliance analysis<\/a><\/strong>,\u00a0<strong>grey box tests<\/strong>\u00a0And\u00a0<strong>simulations of adversary attacks<\/strong>\u00a0to assess the overall resilience of the system.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-3-cartographier-les-surfaces-d-attaque-avant-le-test-d-intrusion\">3. Map the attack surfaces before the penetration test<\/h2>\n\n\n\n<p>Before launching a&nbsp;<strong>LLM pentesting<\/strong>, The first step is a <a href=\"https:\/\/www.intrinsec.com\/en\/easm-external-attack-surface-management\/\">precise mapping of the application and its ecosystem<\/a>. Without this step, the audit would be limited to surface tests (e.g., simple chatbot) and could miss the real issues (data, automation, integrations).<\/p>\n\n\n\n<p>Key aspects of the mapping:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Data feeds and prompts<\/strong>&nbsp;What types of data are transmitted through the prompts (customers, HR, internal IS, logs)? Is there a RAG mechanism, and how are the sources managed (access rights, updates, versioning)?<\/li>\n\n\n\n<li><strong>Connectors and tools<\/strong>&nbsp;What systems can the agent or chatbot query or modify (ERP, CRM, ticketing, technical repositories)? What automation gateways (orchestrators, webhooks, scripts) are triggered by the LLM output?<\/li>\n\n\n\n<li><strong>MLOps Pipeline<\/strong>&nbsp;How is the model trained, tuned, deployed, and versioned? Who can modify the datasets, system prompts, or policies?<\/li>\n<\/ul>\n\n\n\n<p>This map serves as the basis for the perimeter of\u2019<strong><a href=\"https:\/\/www.intrinsec.com\/en\/audit-cybersecurite\/\">technical audit<\/a><\/strong>&nbsp;and of\u2019<strong><a href=\"https:\/\/www.intrinsec.com\/en\/conformite-cadres-reglementaires\/\">cyber audit<\/a><\/strong>&nbsp;: it allows you to define the components to target, the environments to test and the datasets to anonymize.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-4-methodologie-de-pentest-llm-trois-blocs-complementaires\">4. LLM pentesting methodology: three complementary blocks<\/h2>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-4-1-tests-orientes-modele-et-prompts\">4.1. Model-oriented and prompt tests<\/h3>\n\n\n\n<p>The objective is to verify the system&#039;s resilience to malicious or unforeseen interactions on the LLM side.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Attacks on the content of the prompt<\/strong>&nbsp;: attempts to circumvent security instructions (prompt injection, jailbreak).<\/li>\n\n\n\n<li><strong>Exfiltration tests<\/strong>&nbsp;: push the model to reveal internal information (training data, secrets, system prompts, internal rules).<\/li>\n\n\n\n<li><strong>Response integrity tests<\/strong>&nbsp;: analyze the model&#039;s ability to reject malicious solicitations (attack code requests, illicit content).<\/li>\n\n\n\n<li><strong>Hallucination assessment<\/strong>&nbsp;in critical use cases (legal, compliance, finance).<\/li>\n<\/ul>\n\n\n\n<p>The results document the robustness of the system against textual attacks and help to define when human validation remains essential.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-4-2-tests-orientes-integration-et-chaine-d-outils\">4.2. Integration-oriented testing and toolchain<\/h3>\n\n\n\n<p>This layer of the pentesting aims to understand how the application consumes the model outputs and secures the exposed tools.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>LLM output consumption<\/strong>&nbsp;: verification of resistance to HTML\/JS injections on the client or server side; analysis of workflows that execute commands or call APIs based on model responses.<\/li>\n\n\n\n<li><strong>Plugins, tools and connectors<\/strong>&nbsp;: tests for forcing unauthorized calls, verification of access controls (authentication, authorization, parameter validation).<\/li>\n<\/ul>\n\n\n\n<p>This phase brings the&nbsp;<strong>LLM penetration test<\/strong>&nbsp;from an advanced application pentest, enriched by the probabilistic logic inherent in the model.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-4-3-tests-orientes-mlops-et-gouvernance\">4.3. MLOps-oriented testing and governance<\/h3>\n\n\n\n<p>The technical audit must finally cover the complete lifecycle of the model and data.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Data Poisoning and Integrity<\/strong>&nbsp;: analysis of training sources, quality control and access management. Verification of protections against malicious data injection into pipelines or external document databases.<\/li>\n\n\n\n<li><strong>Protection of the model and artifacts<\/strong>&nbsp;: control of access to model weights, verification of access logs, anti-extraction devices (rate limiting, query monitoring).<\/li>\n<\/ul>\n\n\n\n<p>This layer extends the practices&nbsp;<strong>DevSecOps<\/strong>&nbsp;to the universe&nbsp;<strong>MLOps<\/strong>, by integrating security from the training and deployment operations.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-5-transformer-les-resultats-d-audit-en-plan-de-remediation\">5. Transform audit results into a remediation plan<\/h2>\n\n\n\n<p>An LLM audit is only valuable if it leads to a clear and prioritized action plan:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Securing data flows and data<\/strong>&nbsp;: reduction of sensitive data sent to the model, compartmentalization by perimeter, systematic anonymization.<\/li>\n\n\n\n<li><strong>Strengthening of integrations<\/strong>&nbsp;: filters and validations on inputs\/outputs, strong authentication of plugins, fine control of rights and limitation of actions.<\/li>\n\n\n\n<li><strong>Governance and oversight<\/strong>&nbsp;: integration of LLM risks into the overall mapping, regular review of prompts, system, models and data.<\/li>\n<\/ul>\n\n\n\n<p>The goal: to move from a one-off audit to a&nbsp;<strong>continuous improvement loop<\/strong>, in line with existing practices (<a href=\"https:\/\/www.intrinsec.com\/en\/soc-securite-operationnelle\/\">SOC<\/a>, <a href=\"https:\/\/www.intrinsec.com\/en\/gestion-des-vulnerabilites\/\">vulnerability management<\/a>, <a href=\"https:\/\/www.intrinsec.com\/en\/security-architecture-design\/\">architecture magazine<\/a>).<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-6-vers-un-programme-d-audit-llm-recurrent\">6. Towards a recurring LLM audit program<\/h2>\n\n\n\n<p>With the widespread adoption of LLM in business processes, the question is no longer&nbsp;<em>\u00ab&quot;Should we conduct an audit?&quot;\u00bb<\/em>&nbsp;but&nbsp;<em>\u00ab&quot;At what pace and over what area?&quot;\u00bb<\/em><br>A mature program combines:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Regular audits and penetration tests<\/strong>&nbsp;on the new LLM implementations.<\/li>\n\n\n\n<li><strong>Integrated CI\/CD and MLOps Controls<\/strong>&nbsp;to monitor drift, data quality and new attack vectors.<\/li>\n\n\n\n<li><strong>Upskilling of the SOC, GRC and Dev teams<\/strong>&nbsp;according to executives <a href=\"https:\/\/cyber.gouv.fr\/\">ANSSI<\/a> And <a href=\"https:\/\/www.nist.gov\/cyberframework\">NIST<\/a>.<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-conclusion-securisez-l-usage-de-l-ia-dans-votre-structure\">Conclusion: Secure the use of AI within your organization<\/h2>\n\n\n\n<p>LLM is no longer an experimental topic: it is now at the heart of your business processes and customer interactions.<br>A&nbsp;<strong>cyber audit<\/strong>&nbsp;or a&nbsp;<strong>penetration test<\/strong>&nbsp;Specialized generative AI has become necessary to avoid compromises and non-compliance.<\/p>\n\n\n\n<p><strong>Intrinsic<\/strong>, expert in&nbsp;<strong>offensive security<\/strong>&nbsp;For 30 years, we have been helping you transform these risks into levers of resilience:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Technical audit and LLM penetration testing to map and prioritize your vulnerabilities.<\/li>\n\n\n\n<li>Red Team and Purple Team to assess your maturity against advanced AI attacks.<\/li>\n\n\n\n<li>Strategic support: MLOps governance, SOC integration, ANSSI compliance and <a href=\"https:\/\/artificialintelligenceact.eu\/\">EU AI Act<\/a>.<\/li>\n<\/ul>\n\n\n\n<p><\/p>","protected":false},"excerpt":{"rendered":"<p>Large Language Models (LLMs) are currently being developed [\u2026]<\/p>","protected":false},"author":1,"featured_media":231379,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13],"tags":[365],"class_list":["post-231375","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-evaluation-securite","tag-securite-offensive"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.0 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Auditer la s\u00e9curit\u00e9 des LLM - INTRINSEC<\/title>\n<meta name=\"description\" content=\"D\u00e9couvrez comment auditer la s\u00e9curit\u00e9 des LLM pour \u00e9valuer les risques li\u00e9s aux mod\u00e8les de langage avanc\u00e9s.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intrinsec.com\/en\/audit-securite-des-llm\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Auditer la s\u00e9curit\u00e9 des LLM\" \/>\n<meta property=\"og:description\" content=\"D\u00e9couvrez comment auditer la s\u00e9curit\u00e9 des LLM pour \u00e9valuer les risques li\u00e9s aux mod\u00e8les de langage avanc\u00e9s.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intrinsec.com\/en\/audit-securite-des-llm\/\" \/>\n<meta property=\"og:site_name\" content=\"INTRINSEC\" \/>\n<meta property=\"article:published_time\" content=\"2026-01-28T16:55:40+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-10T17:36:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2026\/01\/AI-security-1024x574.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"574\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Intrinsec\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Intrinsec\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/audit-securite-des-llm\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/audit-securite-des-llm\\\/\"},\"author\":{\"name\":\"Intrinsec\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/#\\\/schema\\\/person\\\/ade590fbc7ad6f413727bae7cd3fb799\"},\"headline\":\"Auditer la s\u00e9curit\u00e9 des LLM\",\"datePublished\":\"2026-01-28T16:55:40+00:00\",\"dateModified\":\"2026-03-10T17:36:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/audit-securite-des-llm\\\/\"},\"wordCount\":1352,\"image\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/audit-securite-des-llm\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.intrinsec.com\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/AI-security-scaled.png\",\"keywords\":[\"S\u00e9curit\u00e9 offensive\"],\"articleSection\":[\"Evaluation S\u00e9curit\u00e9\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/audit-securite-des-llm\\\/\",\"url\":\"https:\\\/\\\/www.intrinsec.com\\\/audit-securite-des-llm\\\/\",\"name\":\"Auditer la s\u00e9curit\u00e9 des LLM - INTRINSEC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/audit-securite-des-llm\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/audit-securite-des-llm\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.intrinsec.com\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/AI-security-scaled.png\",\"datePublished\":\"2026-01-28T16:55:40+00:00\",\"dateModified\":\"2026-03-10T17:36:05+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/#\\\/schema\\\/person\\\/ade590fbc7ad6f413727bae7cd3fb799\"},\"description\":\"D\u00e9couvrez comment auditer la s\u00e9curit\u00e9 des LLM pour \u00e9valuer les risques li\u00e9s aux mod\u00e8les de langage avanc\u00e9s.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/audit-securite-des-llm\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.intrinsec.com\\\/audit-securite-des-llm\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/audit-securite-des-llm\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.intrinsec.com\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/AI-security-scaled.png\",\"contentUrl\":\"https:\\\/\\\/www.intrinsec.com\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/AI-security-scaled.png\",\"width\":2560,\"height\":1435,\"caption\":\"AI-security_LLM\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/audit-securite-des-llm\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/www.intrinsec.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Auditer la s\u00e9curit\u00e9 des LLM\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/#website\",\"url\":\"https:\\\/\\\/www.intrinsec.com\\\/\",\"name\":\"INTRINSEC\",\"description\":\"Notre m\u00e9tier , Prot\u00e9ger le v\u00f4tre\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.intrinsec.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/#\\\/schema\\\/person\\\/ade590fbc7ad6f413727bae7cd3fb799\",\"name\":\"Intrinsec\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fde6ed961c7078765b03a213927b5c4001b1cef4787255188f5b502a99e6ddd6?s=96&d=retro&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fde6ed961c7078765b03a213927b5c4001b1cef4787255188f5b502a99e6ddd6?s=96&d=retro&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fde6ed961c7078765b03a213927b5c4001b1cef4787255188f5b502a99e6ddd6?s=96&d=retro&r=g\",\"caption\":\"Intrinsec\"},\"sameAs\":[\"https:\\\/\\\/www.intrinsec.com\"],\"url\":\"https:\\\/\\\/www.intrinsec.com\\\/en\\\/author\\\/ufhtbqccsz\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Auditing the security of LLMs - INTRINSEC","description":"Discover how to audit LLM security to assess risks associated with advanced language models.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intrinsec.com\/en\/audit-securite-des-llm\/","og_locale":"en_US","og_type":"article","og_title":"Auditer la s\u00e9curit\u00e9 des LLM","og_description":"D\u00e9couvrez comment auditer la s\u00e9curit\u00e9 des LLM pour \u00e9valuer les risques li\u00e9s aux mod\u00e8les de langage avanc\u00e9s.","og_url":"https:\/\/www.intrinsec.com\/en\/audit-securite-des-llm\/","og_site_name":"INTRINSEC","article_published_time":"2026-01-28T16:55:40+00:00","article_modified_time":"2026-03-10T17:36:05+00:00","og_image":[{"width":1024,"height":574,"url":"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2026\/01\/AI-security-1024x574.png","type":"image\/png"}],"author":"Intrinsec","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Intrinsec","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.intrinsec.com\/audit-securite-des-llm\/#article","isPartOf":{"@id":"https:\/\/www.intrinsec.com\/audit-securite-des-llm\/"},"author":{"name":"Intrinsec","@id":"https:\/\/www.intrinsec.com\/#\/schema\/person\/ade590fbc7ad6f413727bae7cd3fb799"},"headline":"Auditer la s\u00e9curit\u00e9 des LLM","datePublished":"2026-01-28T16:55:40+00:00","dateModified":"2026-03-10T17:36:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intrinsec.com\/audit-securite-des-llm\/"},"wordCount":1352,"image":{"@id":"https:\/\/www.intrinsec.com\/audit-securite-des-llm\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2026\/01\/AI-security-scaled.png","keywords":["S\u00e9curit\u00e9 offensive"],"articleSection":["Evaluation S\u00e9curit\u00e9"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.intrinsec.com\/audit-securite-des-llm\/","url":"https:\/\/www.intrinsec.com\/audit-securite-des-llm\/","name":"Auditing the security of LLMs - INTRINSEC","isPartOf":{"@id":"https:\/\/www.intrinsec.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intrinsec.com\/audit-securite-des-llm\/#primaryimage"},"image":{"@id":"https:\/\/www.intrinsec.com\/audit-securite-des-llm\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2026\/01\/AI-security-scaled.png","datePublished":"2026-01-28T16:55:40+00:00","dateModified":"2026-03-10T17:36:05+00:00","author":{"@id":"https:\/\/www.intrinsec.com\/#\/schema\/person\/ade590fbc7ad6f413727bae7cd3fb799"},"description":"Discover how to audit LLM security to assess risks associated with advanced language models.","breadcrumb":{"@id":"https:\/\/www.intrinsec.com\/audit-securite-des-llm\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intrinsec.com\/audit-securite-des-llm\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.intrinsec.com\/audit-securite-des-llm\/#primaryimage","url":"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2026\/01\/AI-security-scaled.png","contentUrl":"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2026\/01\/AI-security-scaled.png","width":2560,"height":1435,"caption":"AI-security_LLM"},{"@type":"BreadcrumbList","@id":"https:\/\/www.intrinsec.com\/audit-securite-des-llm\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.intrinsec.com\/"},{"@type":"ListItem","position":2,"name":"Auditer la s\u00e9curit\u00e9 des LLM"}]},{"@type":"WebSite","@id":"https:\/\/www.intrinsec.com\/#website","url":"https:\/\/www.intrinsec.com\/","name":"INTRINSEC","description":"Our job is to protect yours.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intrinsec.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.intrinsec.com\/#\/schema\/person\/ade590fbc7ad6f413727bae7cd3fb799","name":"Intrinsic","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/fde6ed961c7078765b03a213927b5c4001b1cef4787255188f5b502a99e6ddd6?s=96&d=retro&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fde6ed961c7078765b03a213927b5c4001b1cef4787255188f5b502a99e6ddd6?s=96&d=retro&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fde6ed961c7078765b03a213927b5c4001b1cef4787255188f5b502a99e6ddd6?s=96&d=retro&r=g","caption":"Intrinsec"},"sameAs":["https:\/\/www.intrinsec.com"],"url":"https:\/\/www.intrinsec.com\/en\/author\/ufhtbqccsz\/"}]}},"_links":{"self":[{"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/posts\/231375","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/comments?post=231375"}],"version-history":[{"count":5,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/posts\/231375\/revisions"}],"predecessor-version":[{"id":231597,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/posts\/231375\/revisions\/231597"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/media\/231379"}],"wp:attachment":[{"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/media?parent=231375"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/categories?post=231375"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/tags?post=231375"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}