An analysis identifying potential attackers, attack vectors, assets at risk, and security boundaries for a system. Threat models inform security requirements, testing priorities, and control design; they should be documented and updated as systems evolve.
See: Adversarial attack; OWASP Top 10 for LLMs; Prompt injection; Risk assessment; Security