AUSTA | Adversarial Intelligence

Security Engineering · Pillar Reference

The 2026 LLM Security Checklist: 47 Controls Across 7 Categories

A canonical reference for auditing LLM-powered applications before production. Walk it end-to-end, answer each control yes, no, or partial, and you will surface every wedge an attacker is likely to use. Free PDF below.

By Austa · Published · ~14 min read · 47 controls

Why this checklist exists

Every product shipping an LLM feature in 2026 is also shipping a fresh attack surface. The application security playbook teams learned for REST APIs (rate limit, validate inputs, scope tokens, log everything) does not directly transfer. Prompts are not request bodies. Tool calls are not RPCs. Vector stores are not relational tables. The threats that bite are the ones engineers do not yet have a reflex for.

This is the checklist we wish every team had before incident response had to write the postmortem. It is built from real attack patterns observed against production LLM apps, organized into seven categories that incident retrospectives keep returning to. 47 controls total. Designed to be walked in a single 3-to-5-hour session by an engineer familiar with the system.

Scope: this checklist covers security (what an attacker can do to your system). It is not an AI safety checklist (what your system might do on benign input, like hallucinations or bias). Those are separate evaluation methodologies. The overlap is at the boundary (moderation bypass is both).

How to use this checklist

For each control, mark one of three answers:

Walking the full checklist for the first time usually surfaces 8 to 15 partial-or-no answers. That is normal. The checklist is a starting point for a backlog, not a pass-fail gate. Re-walk after every major change to prompts, tools, or the LLM provider. Re-walks take 30 to 45 minutes once the system is documented.

Free PDF checklist

One page per category, checkboxes, notes columns. Print or fill in on screen. Updated quarterly.

Download PDF (v2026.05) No email required. Versioning matches release date.

1. Input attack surface (7 controls)

The first audit lane: every player-, user-, or external-system-controlled input that ends up in an LLM prompt or context window. The mental model is "any byte the attacker writes that the model reads."

2. Prompt construction (8 controls)

How user input is composed into the prompt the LLM actually sees. Most prompt injection is a prompt construction failure, not a model failure.

3. Output handling (6 controls)

What you do with the LLM's response before it reaches a user, a tool, or a downstream system. Output handling is where prompt injection becomes RCE in the worst cases.

4. Tool and agent use (7 controls)

Tools are how LLMs get teeth. They are also how a prompt injection becomes a real-world action. Every tool the agent can call expands the blast radius.

5. Memory and RAG (6 controls)

The state that persists between sessions is the new attack surface. Long-lived memory, vector stores, and RAG corpora all carry attacker-controlled bytes forward in time.

6. Identity and authorization (6 controls)

Who is the LLM acting on behalf of, and what is that identity allowed to do? Get this wrong and the attacker does not need to break the LLM at all.

7. Monitoring and observability (7 controls)

You cannot defend what you cannot see. LLM observability lags HTTP observability by years; closing the gap is the highest-leverage control left after the others are in place.

Use this checklist

Walk the seven categories in order, top to bottom. Most teams find the input attack surface and prompt construction categories the easiest to fix and the most impactful. Tool/agent use is the highest blast-radius category if the system has tools; treat any No/Partial there as urgent.

After the first walk-through, file every No and Partial as an issue with a due date. Re-walk the full checklist quarterly. Re-walk just the affected categories after any major prompt, tool, or model change.

Download the PDF checklist

One page per category, with checkboxes for Yes / No / Partial and a notes column. Print or annotate on screen.

Get the PDF (v2026.05) No email required. Republish freely with attribution.

How this maps to OWASP Top 10 for LLMs

OWASP Top 10 for LLM Applications ranks the most common risk classes. This checklist breaks those classes into specific auditable controls. Quick mapping:

Related articles

Adjacent platforms worth walking this against

If your LLM application sits on top of any of these, the platform layer has its own surface that this checklist applies to:

Bi-weekly AI Security Brief

If you found this useful, the Austa team publishes a bi-weekly newsletter rounding up the most useful incidents (jailbreaks, agent attacks, data leaks, regulatory news) from the past two weeks. Curated, no fluff. Subscribe via the homepage.

License and republishing

This checklist is published under CC BY 4.0. Translate, adapt, embed, or republish freely with attribution to Austa (link back to this page). Pull requests with corrections or additions are welcome (we will publish the v2026.06 update in August).