1:"$Sreact.fragment" 2:I[99456,["/_next/static/chunks/b292ef59945299fb.js","/_next/static/chunks/db1ed03dad8fa1ad.js"],"ViewportBoundary"] 4:I[99456,["/_next/static/chunks/b292ef59945299fb.js","/_next/static/chunks/db1ed03dad8fa1ad.js"],"MetadataBoundary"] 5:"$Sreact.suspense" 7:I[98433,["/_next/static/chunks/b292ef59945299fb.js","/_next/static/chunks/db1ed03dad8fa1ad.js"],"IconMark"] 0:{"buildId":"hEyQdfANp7GcGtypER5lV","rsc":["$","$1","h",{"children":[null,["$","$L2",null,{"children":"$@3"}],["$","div",null,{"hidden":true,"children":["$","$L4",null,{"children":["$","$5",null,{"name":"Next.Metadata","children":"$@6"}]}]}],["$","meta",null,{"name":"next-size-adjust","content":""}]]}],"loading":null,"isPartial":false} 3:[["$","meta","0",{"charSet":"utf-8"}],["$","meta","1",{"name":"viewport","content":"width=device-width, initial-scale=1"}]] 6:[["$","title","0",{"children":"Sécuriser vos LLMs : Top 5 des vulnérabilités (OWASP Top 10 for LLMs) | Blog Ikasia"}],["$","meta","1",{"name":"description","content":"L'intégration de LLMs en entreprise ouvre de nouvelles failles de sécurité. Découvrez les 5 vulnérabilités les plus critiques et comment vous en prémunir."}],["$","meta","2",{"property":"og:title","content":"Sécuriser vos LLMs : Top 5 des vulnérabilités (OWASP Top 10 for LLMs)"}],["$","meta","3",{"property":"og:description","content":"L'intégration de LLMs en entreprise ouvre de nouvelles failles de sécurité. Découvrez les 5 vulnérabilités les plus critiques et comment vous en prémunir."}],["$","meta","4",{"property":"og:type","content":"article"}],["$","meta","5",{"property":"article:published_time","content":"2025-06-20"}],["$","meta","6",{"property":"article:author","content":"Guillaume Hochard"}],["$","meta","7",{"property":"article:tag","content":"Sécurité"}],["$","meta","8",{"property":"article:tag","content":"LLM"}],["$","meta","9",{"property":"article:tag","content":"Cybersécurité"}],["$","meta","10",{"name":"twitter:card","content":"summary"}],["$","meta","11",{"name":"twitter:title","content":"Sécuriser vos LLMs : Top 5 des vulnérabilités (OWASP Top 10 for LLMs)"}],["$","meta","12",{"name":"twitter:description","content":"L'intégration de LLMs en entreprise ouvre de nouvelles failles de sécurité. Découvrez les 5 vulnérabilités les plus critiques et comment vous en prémunir."}],["$","link","13",{"rel":"icon","href":"/favicon.ico?favicon.0b3bf435.ico","sizes":"256x256","type":"image/x-icon"}],["$","$L7","14",{}]]