Discussion about this post

User's avatar
Pawel Jozefiak's avatar

The .h5 deserialization vulnerability is a good example of the supply chain problem that gets less attention than prompt injection. The 'AI models are executable code' framing is the right one to use with security teams, which reframes threat modeling around deployment rather than just user input.

The blast radius mapping point is underappreciated too. Whether you're running local models or cloud, figuring out what an infected model server can reach should come before the pentest, not during it. Most teams I've seen treat the model weights as static data. They're not.

No posts

Ready for more?