A vulnerability where AI systems consume excessive computational or financial resources without limits. OWASP Top 10 for LLMs identifies this as a key risk; rate limiting, budget controls, and resource monitoring are mitigations.
A vulnerability where AI systems consume excessive computational or financial resources without limits. OWASP Top 10 for LLMs identifies this as a key risk; rate limiting, budget controls, and resource monitoring are mitigations.