We audited both MCP SDKs – three classes of boundary-crossing vulnerabilities 1 pts|5 days ago|discuss
The OWASP LLM Top: A Practical Attack Guide (with 122 real attack techniques) 1 pts|19 days ago|discuss