PinnedDaniel LlewellynDefending yourself against prompt injectionPrompt defenseNov 17, 2023Nov 17, 2023
PinnedDaniel LlewellyninSystem Weakness3 Steps to protect yourself from Prompt InjectionHead over to https://defender.safetorun.com to quickstart!May 1May 1
Daniel LlewellynThe best attacks and defences against prompt injectionA framework for evaluation of attacks and defencesMay 10May 10
Daniel LlewellynRisks and RiddlesThe new security battlegrounds of applications using ChatGPTDec 13, 2023Dec 13, 2023
Daniel LlewellynAndroid Hacking & Securing “Insecure Shop” — Unprotected Data URIsThis is the part of a series of articles, we’re going to look at how to hack and then secure this app:Aug 5, 2023Aug 5, 2023
Daniel LlewellynSecurity as CodeReinforcing the Foundations of Digital FortressesJul 19, 2023Jul 19, 2023
Daniel LlewellyninThe Tech CollectiveCreating a chat GPT plugin with micronaut & cognitoWhat are chat GPT plugins?Jul 14, 2023Jul 14, 2023
Daniel LlewellyninThe Tech CollectiveSoftware teams should be more like Ninjas, and less like SamuraiIt is the greatest Samurai who lets his sword rust in it’s scabbardJul 7, 2023Jul 7, 2023
Daniel LlewellyninAndroid AppSec by Safe to runDigital Battlefields: Unraveling the Origins of Mobile AttacksThis article will venture into the heart of digital threats, exploring the origins and mechanisms of mobile attacksJul 4, 2023Jul 4, 2023
Daniel LlewellyninAndroid AppSec by Safe to runSecuring Android apps with Safe to Run PlusAndroid security is hard — safe to run makes it simpleJun 27, 2023Jun 27, 2023