AppSec & AI Security Word Search

Edit Answers
EQOEJHREMEDIATIONAHYLUSCS YFVJKCGPJCZOSDEPENDENCYIE UWCUBDOYTBOHMXIEJAYNLZDXC TIEGDDCMDRAMFMJBFLEFPXNJU VNMHLWORPDAIPMGIPYWYCQEKR SDSEANOTOLLNYORGSSPTDMMAI YSAQNTUWNTIXSSNKLICIYLOLT HUPICDAEROAATFSEESXLKDYBY URYEAIAAMIIINIOGNTVIAVCKS GFVEPGTIPBDTRCVRJTVBEIYFE GGXLLIEOZEELCPEEMVSARDWBB IKFQOUWNSUADIEZJEEVRBSBAA NZGNOEHUTRERDYJTNWRELEXPV GQEERTONOSDORISNMOFNISSGO FGVECIXIAYPEVANAIJKLAASNE ASDQCEVJUETXSYUGCTGUJIQIM CKAIVAECNANREVOGRSPVNBLNL EWLYHYGSAGUIALXEZCCMTYYUE VAXEZHOBRBWADPDGZJUBOGCTD MZBKBURQCGARTTDQIERPSRGEO FYEXRIYRMWJBETORARSUDJPNM RDHCPQRCOWBAFXYHIVOMQNUII BSEJJDLWNPMAMIXPUHRQRFOFA XIQNZHALLUCINATIONTCAPXUI JFRAMEWORKSZQNLSEICILOPQV
1.
PROMPTINJECTION
2.
REDTEAM
3.
SHADOWAI
4.
VULNERABILITY
5.
COMPLIANCE
6.
GOVERNANCE
7.
DEPENDENCY
8.
SCA
9.
REMEDIATION
10.
SBOM
11.
HALLUCINATION
12.
RAG
13.
MEND
14.
VECTORDB
15.
JAILBREAK
16.
ANALYSIS
17.
OPENSOURCE
18.
SAST
19.
HUGGINGFACE
20.
SECURITY
21.
CURSOR
22.
EXFILTRATION
23.
WINDSURF
24.
POLICIES
25.
BIASES
26.
TRANSFORMER
27.
MALICIOUS
28.
EMBEDDING
29.
FINETUNING
30.
THIRDPARTY
31.
AIPOWERED
32.
MENDAI
33.
AIMODEL
34.
FRAMEWORK
35.
COMPONENTS
36.
BEHAVIORALRISKS
37.
FIRSTIDES
38.
AIAGENTS