🧠OWASP LLM Top 10 LLM03Rule: OWASP-LLM-003critical

Supply Chain Vulnerabilities

Description

Compromised models, datasets, libraries, or pre-trained components introduce risk into LLM applications.

⚠️ Risk Impact

LLM apps stack 80%+ third-party components: foundation models, embedding models, vector stores, orchestration libraries (LangChain, LlamaIndex), hosted APIs. Each is a supply-chain attack surface.

🔍 How EchelonGraph Detects This

OWASP-LLM-003Automated scanner rule

EchelonGraph's Tier 1 Cloud Scanner automatically checks for this condition across all connected cloud accounts. Violations are flagged as critical-severity findings with remediation guidance.

🖥️ Manual Verification

terminal
# Scan an LLM workload for known CVEs
trivy image --severity HIGH,CRITICAL your-llm-workload:latest

🔧 Remediation

Pin model versions; verify signatures. Scan dependencies (pip-audit, Snyk, Trivy). Maintain SBOM for LLM workloads. Restrict model-provider list. Cosign-verify container images.

💀 Real-World Attack Scenario

PyTorch supply-chain attack (Dec 2022): malicious 'torchtriton' uploaded to PyPI matching the legitimate Triton release name. Nightly PyTorch builds pulled the malicious package over the weekend; the package exfiltrated SSH + GPG keys via DNS. Estimated affected: high thousands of ML developers worldwide.

💰 Cost of Non-Compliance

Avg LLM supply-chain breach in 2024: $4.6M (IBM). PyTorch incident: widespread but undisclosed total cost.

📋 Audit Questions

  • 1.Show me the SBOM for your top LLM application.
  • 2.How are LLM model versions pinned and verified?
  • 3.What is the CVE remediation SLA for LLM dependencies?
  • 4.Who reviews new LLM library additions?

🎯 MITRE ATT&CK Mapping

T1195.001 — Compromise Software DependenciesMITRE_ATLAS-AML.T0010 — ML Supply Chain Compromise

⚡ Common Pitfalls

  • Pinning by version tag (mutable) rather than hash (immutable)
  • Skipping SBOM for ML workloads — only the container is scanned
  • Auto-updating to 'latest' on schedule without review

📈 Business Value

Supply-chain hardening prevents the highest-frequency 2024 LLM attack vector. Reduces avg breach risk by 60-80%.

⏱️ Effort Estimate

Manual

3-4 weeks for SBOM + scanning + signature verification

With EchelonGraph

EchelonGraph SBOM + LLM supply-chain monitor with auto-CVE correlation

🔗 Cross-Framework References

MITRE_ATLAS-AML.T0010EUAIA-ART15-CYBERSEC

Automate OWASP LLM Top 10 LLM03 compliance

EchelonGraph continuously monitors this control across all your cloud accounts.

Start Free →