Secure Data Consortium Logo Secure Data Consortium

LLM Application Development & Security

Custom LLM application builds, on-premises model deployment, and adversarial security testing for organizations putting AI into production. Project-based engagements with written deliverables.

Start a conversation Schedule a scoping call

What this practice does

Secure Data Consortium provides hands-on LLM application work for organizations building with — or building on top of — large language models. The practice combines 19+ years of enterprise software architecture experience with active adversarial security research, delivered as a single practitioner.

Why this practice

Most LLM-adjacent consulting in the market today comes from one of two directions: security generalists who don't ship code, or LLM developers who don't think about security architecture. This practice combines both backgrounds in one practitioner.

CISSP CSSLP CRISC

How engagements work

Single-practitioner boutique practice. The engagement model is built around delivering high-quality work without the failure modes of embedded-contractor relationships.

From the lab

Independent research and writeups, published periodically:

Indirect prompt injection across four open-weight LLMs

A 1,280-trial study characterizing indirect prompt injection susceptibility across Llama 3.1 8B, Mistral 7B, Qwen 2.5 7B, and Qwen 2.5 Coder 7B at two production-realistic temperatures. Key findings: temperature reduction is not a reliable defense on susceptible models; output format constraint achieved 0/40 injection on the most-susceptible model tested.

Read the article on Medium  ·  Reproducible harness on GitHub

Currently researching: locally-hosted LLM monitoring of network traffic for IoT exfiltration

Active research project applying locally-hosted LLMs to network traffic and log analysis for detection of unauthorized data exfiltration from IoT and media devices. The objective is a self-hostable detection layer that does not depend on cloud-based traffic analysis services. Writeup planned once methodology is stable.

Start a conversation

The fastest path to determining if this practice fits your need is a 30-minute scoping call. Fill out the form below or schedule directly.