Confirm

TARA Framework

Threat Analysis & Risk Assessment for LLM-Powered Applications

Based on: "Invitation Is All You Need! Promptware Attacks Against LLM-Powered Assistants in Production Are Practical and Dangerous"
0
Total Threats
0
Critical Risks
0
High Risks
0
Medium Risks
0
Low Risks

📊 Risk Distribution

Add threats to see risk distribution

🛡️ Residual Risk

Add threats to see residual risk distribution

🎯 STRIDE Categories

Add threats to see STRIDE distribution

🏷️ Threat Classes

Add threats to see threat class distribution

📋 Recent Threats

No threats added yet. Go to "Add Threat" to begin your assessment.

📄

Cite This Work

If you use this framework in your research or work, please cite the paper:

"Invitation Is All You Need! Promptware Attacks Against LLM-Powered Assistants in Production Are Practical and Dangerous"
Ben Nassi, Stav Cohen, Or Yair
arXiv:2508.12175 [cs.CR], 2025

Add New Threat

STRIDE Category ? STRIDE+O is a threat modeling framework:

Spoofing - Impersonating something or someone
Tampering - Modifying data or code
Repudiation - Denying performed actions
Information Disclosure - Exposing information
Denial of Service - Disrupting availability
Elevation of Privilege - Gaining unauthorized access
Other - Threats not fitting other categories

S
Spoofing
T
Tampering
R
Repudiation
I
Info Disclosure
D
Denial of Service
E
Elevation of Privilege
O
Other

Impact Assessment ? Impact is determined by the configured calculation method.

0
Impact Score
NEGLIGIBLE

Likelihood / Practicality Assessment ? Likelihood is calculated using the configured calculation method. Higher scores = more likely/practical attack.

3.00
Likelihood Score
VERY LIKELY

Calculated Risk

LOW
Global Risk Score
LOW

Mitigations

Calculate Residual Risk (After Mitigations)

Re-assess the likelihood factors assuming mitigations are deployed:

0.00
Residual Likelihood
VERY UNLIKELY

All Threats

Compact (click rows to expand)
Full Table (all columns)

No threats added yet.

🎯 Interactive Risk Matrix

Risk = Impact × Likelihood. Click on any cell to see which threats fall into that risk category.

📋 All Threats Summary

Add threats to see them plotted on the risk matrix.

TARA Methodology

This framework implements the Threat Analysis and Risk Assessment (TARA) methodology from the research paper "Invitation Is All You Need!" for evaluating security risks to end users of LLM-powered applications.

💡 All categories, factors, and calculations can be customized in the Settings tab.

💥
Impact Score
0-4
MAX of categories
📊
Likelihood Score
0-3
AVG of factors
⚠️
Risk Levels
6
Very Low → Critical
🔄
Residual Risk
Post-Mitigation
Re-assessed likelihood
📋

7 Steps of Risk Assessment

1
Asset Identification Catalog user assets to secure (data, devices, privacy)
2
Adversary Identification Profile the adversary and threat model
3
Threat Modeling Predict threats using STRIDE+O framework
4
Likelihood & Impact Calculate practicality and impact scores
5
Risk Assessment Create risk matrix (Impact × Likelihood)
6
Risk Treatment Plan mitigations (reduce, transfer, accept)
7
Residual Risk Re-assess after mitigations are deployed
🏷️

LLM Threat Classes

The paper identifies 5 primary threat classes specific to LLM-powered applications:

Short-term Context Poisoning
Malicious content injected into the current conversation context via indirect prompt injection
🧠
Long-term Memory Poisoning
Persistent poisoning of LLM's saved memory that affects future sessions
🔧
Tool Misuse
Exploiting integrated tools (calendar, email, etc.) to perform unauthorized actions
🤖
Automatic Agent Invocation
Triggering autonomous agent actions without user consent or awareness
📱
Automatic App Invocation
Forcing LLM to invoke external applications maliciously
🛡️

STRIDE+O Threat Categories

Extended STRIDE framework with "Other" category for LLM-specific threats:

S
Spoofing
Impersonating something or someone else
T
Tampering
Modifying data or code without authorization
R
Repudiation
Denying actions were performed
I
Information Disclosure
Exposing data to unauthorized parties
D
Denial of Service
Disrupting service availability
E
Elevation of Privilege
Gaining unauthorized access or capabilities
O
Other
Threats not fitting traditional categories
💥

Impact Assessment (0-4 Scale)

Impact Score = Maximum value across all impact categories. Higher score = greater harm.

0
Negligible
1
Minor
2
Moderate
3
Severe
4
Critical
Score Safety Privacy Financial Operational
0No impactNo exposureNo lossNo effect
1Minor mental impactNon-sensitive data< $100Easy to revert
2Significant mentalGeolocation exposed< $1KSome effort
3Physical affectedImportant info leaked< $10KSignificant effort
4Life-threateningSensitive data/video> $10KLoss of capability
📊

Likelihood Assessment (0-3 Scale)

Likelihood Score = Average of all factor scores. Higher score = easier to exploit.

0
Hard
1
Moderate
2
Easy
3
Very Easy
Factor3 (Easy)210 (Hard)
EquipmentStandard laptopSpecialized GPUMultiple specializedRestricted tools
ExpertiseLaymanProficient (B.Sc)Expert (Ph.D)Multiple experts
WindowUnlimitedFrequentRare (monthly)Very rare (yearly)
KnowledgePublic infoEmail neededPassword neededImplementation details
TimeDays1-4 weeks1-6 months6+ months
InteractionNone (0-click)Standard actionSpecial actionExtensive
Very Unlikely < 0.6
Unlikely 0.6 - 1.2
Moderately Likely 1.2 - 1.8
Likely 1.8 - 2.4
Very Likely ≥ 2.4
🔄

Residual Risk Calculation

After mitigations are deployed, likelihood factors are re-assessed while impact remains unchanged:

⚠️
Initial Risk
Impact × Likelihood
🛡️
Apply Mitigations
Security controls
📊
Re-assess Likelihood
Usually decreases
Residual Risk
Impact × New Likelihood

Note: Impact typically stays the same (the potential harm doesn't change), but likelihood decreases as mitigations make attacks harder to execute.

⚙️ Settings

Manage your threat data and customize all framework settings.

📁

Data Management

📤

Export Threats

Download your threats for backup or reporting.

📥

Import Threats

Load threats from a previously exported file.

📄

Sample Data

Load the 14 threats from Table 2 of the paper.

⚠️

Delete Data

Permanently delete all threats.

🔧

Framework Configuration

🏷️

Threat Classes

Manage threat class categories.

💥

Impact Categories

Manage impact assessment categories (0-4 scale).

📊

Likelihood Factors

Manage likelihood factors (0-3 scale).

📈

Impact Scale (0-4)

Customize impact level labels.

📉

Likelihood Scale (0-3)

Customize likelihood level labels.

🚦

Risk Levels & Colors

Customize risk level names and colors. Click color to change.

🔢

Risk Matrix

Configure how Impact × Likelihood maps to Risk Level. Click any cell to change.

💾

Configuration Backup

📤

Export Settings

Save your customizations to a file.

📥

Import Settings

Load settings from another user.

🔄

Reset All

Reset all settings to defaults.

⚠️ Delete All Threats?

This will permanently delete 0 threats. This action cannot be undone.

Type DELETE to confirm: