This section contains practical notes on building, testing, monitoring, and defending LLM applications.

The focus is on LLMOps workflows, automated evaluation, guardrails, safety metrics, RAG controls, and red teaming techniques for AI-powered systems.

The goal is to keep the notes implementation-oriented: useful patterns, common failure modes, and security controls that can be applied when designing or assessing LLM applications.


This section contains distilled notes from my Cyber AI Security study.

Full repository (expanded notes, examples, and supporting material): https://github.com/lameiro0x/cyber-ai-security-notes