site/docs/red-team/risk-scoring.md
Promptfoo provides a risk scoring system that quantifies the severity and likelihood of vulnerabilities in your LLM application. Each vulnerability is assigned a risk score between 0 and 10 that helps you prioritize remediation efforts.
Our risk scoring methodology is based on industry-standard CVSS (Common Vulnerability Scoring System) principles, adapted specifically for LLM security assessments. This approach ensures that security professionals can interpret scores using familiar frameworks and integrate findings into existing vulnerability management workflows.
The risk scoring is available on the Red team Vulnerability Reports.
The risk score uses a multi-component additive model based on CVSS principles:
Each vulnerability type has a base impact score reflecting potential business and security impact:
:::tip Enterprise customers can modify the severity of vulnerabilities to reflect the risk they pose to your company. :::
Based on the Attack Success Rate (ASR) during testing, using a linear scaling function:
This ensures that even low success rates contribute to the risk score, while maintaining clear differentiation between different exploit success levels.
Assesses the risk based on human exploitability and attack complexity:
The base human factor score is then scaled by success rate using the formula:
baseScore × (0.8 + 0.2 × success_rate)
This scaling ensures that even with low success rates, human-exploitable vulnerabilities retain most of their risk weight, while high success rates increase the final modifier.
Additional penalty for easily executable attacks:
Following CVSS v3.x/v4.0 severity levels:
Even with low success rate, critical vulnerabilities achieve high risk scores due to severe impact potential.
High severity vulnerabilities with high success rates achieve near-critical scores.
Medium severity issues with substantial success rates can escalate to high-risk classification.
For overall system assessment, Promptfoo calculates a system-wide risk score that considers:
This approach follows industry best practices for aggregating individual vulnerability scores into comprehensive security posture assessments.
Prioritize Critical and High Scores: Address vulnerabilities with scores ≥9.0 (critical) and ≥7.0 (high) immediately
Establish SLA-Based Remediation: Use CVSS-aligned timelines:
Set Deployment Gates: Establish risk score thresholds for CI/CD pipelines (e.g., block deployment if system score > 7.0)
Track Risk Trends: Monitor score changes over time to measure security improvements and identify emerging threats
Integration with Security Tools: Export risk scores to SIEM, vulnerability management, or GRC platforms using CVSS-compatible formats
Continuous Assessment: Regular red team testing maintains accurate risk assessments as your LLM system evolves
Strategy-Specific Mitigation: Use the strategy breakdown to implement targeted defenses against the most successful attack vectors