Back to directory
WRITEUP #577

Playing With Fire – How We Executed A Critical Supply Chain Attack On Pytorch

AI / LLMCI/CDSupply chain attack
byJohn Stawinski
Bounty
5,500
Program
PyTorchMeta / Facebook
Published
Jan 11, 2024
Added to HackDex
Jan 18, 2024
Read Full Writeuphttps://johnstawinski.com/2024/01/11/playing-with-fire-how-we-executed-a-critical-supply-chain-attack-on-pytorch/
RELATED WRITEUPS
Revival Hijack – PyPI hijack technique exploited in the wild, puts 22K packages at risk
AI / LLMCI/CD
GitHub Actions Exploitation: Repo Jacking And Environment Manipulation
AI / LLMRepojacking
Unmasking Harmful Content in a Medical Chatbot: A Red Team Perspective
AI / LLMAI
Microsoft Copilot: From Prompt Injection to Exfiltration of Personal Information
AI / LLMAI
Google AI Studio: LLM-Powered Data Exfiltration Hits Again! Quickly Fixed.
AI / LLMAI

Built with ❤️ by Shubham Rawat