Threat Analysis & Risk Assessment for LLM-Powered Applications
No threats added yet. Go to "Add Threat" to begin your assessment.
If you use this framework in your research or work, please cite the paper:
Re-assess the likelihood factors assuming mitigations are deployed:
No threats added yet.
Risk = Impact × Likelihood. Click on any cell to see which threats fall into that risk category.
Add threats to see them plotted on the risk matrix.
This framework implements the Threat Analysis and Risk Assessment (TARA) methodology from the research paper "Invitation Is All You Need!" for evaluating security risks to end users of LLM-powered applications.
💡 All categories, factors, and calculations can be customized in the Settings tab.
The paper identifies 5 primary threat classes specific to LLM-powered applications:
Extended STRIDE framework with "Other" category for LLM-specific threats:
Impact Score = Maximum value across all impact categories. Higher score = greater harm.
| Score | Safety | Privacy | Financial | Operational |
|---|---|---|---|---|
| 0 | No impact | No exposure | No loss | No effect |
| 1 | Minor mental impact | Non-sensitive data | < $100 | Easy to revert |
| 2 | Significant mental | Geolocation exposed | < $1K | Some effort |
| 3 | Physical affected | Important info leaked | < $10K | Significant effort |
| 4 | Life-threatening | Sensitive data/video | > $10K | Loss of capability |
Likelihood Score = Average of all factor scores. Higher score = easier to exploit.
| Factor | 3 (Easy) | 2 | 1 | 0 (Hard) |
|---|---|---|---|---|
| Equipment | Standard laptop | Specialized GPU | Multiple specialized | Restricted tools |
| Expertise | Layman | Proficient (B.Sc) | Expert (Ph.D) | Multiple experts |
| Window | Unlimited | Frequent | Rare (monthly) | Very rare (yearly) |
| Knowledge | Public info | Email needed | Password needed | Implementation details |
| Time | Days | 1-4 weeks | 1-6 months | 6+ months |
| Interaction | None (0-click) | Standard action | Special action | Extensive |
After mitigations are deployed, likelihood factors are re-assessed while impact remains unchanged:
Note: Impact typically stays the same (the potential harm doesn't change), but likelihood decreases as mitigations make attacks harder to execute.
Manage your threat data and customize all framework settings.
Download your threats for backup or reporting.
Load threats from a previously exported file.
Load the 14 threats from Table 2 of the paper.
Permanently delete all threats.
Manage threat class categories.
Manage impact assessment categories (0-4 scale).
Manage likelihood factors (0-3 scale).
Customize impact level labels.
Customize likelihood level labels.
Customize risk level names and colors. Click color to change.
Configure how Impact × Likelihood maps to Risk Level. Click any cell to change.
Save your customizations to a file.
Load settings from another user.
Reset all settings to defaults.