APromptRiskDBThreat intelligence atlas
AI Mitigation

Vulnerability Scanning - AI Mitigation

Vulnerability scanning is used to find potentially exploitable software vulnerabilities to remediate them. File formats such as pickle files that are commonly used to store AI models can contain exploits that allow for arbitrary code execution. These files should be scanned for potentially unsafe calls, which could be used to execute code, create new processes, or establish networking capabilities. Adversaries may...

AI MitigationML Model EngineeringData PreparationTechnical - Cyber

Record summary

A quick snapshot of what this page covers.

Techniques3Attacks this defense is designed to help with.
Lifecycle2Where this defense applies in the AI lifecycle.
Categories1How the source groups this defense.

Control summary

What this defense is meant to help prevent.

Vulnerability scanning is used to find potentially exploitable software vulnerabilities to remediate them.

File formats such as pickle files that are commonly used to store AI models can contain exploits that allow for arbitrary code execution. These files should be scanned for potentially unsafe calls, which could be used to execute code, create new processes, or establish networking capabilities. Adversaries may embed malicious code in model corrupt model files, so scanners should be capable of working with models that cannot be fully de-serialized. Model artifacts, downstream products produced by models, and external software dependencies should be scanned for known vulnerabilities.

ATLAS ID
AML.M0016
ATT&CK external ID
M1016
Priority score
15
ML Model EngineeringData Preparation
Technical - Cyber

Covered techniques

Attacks this defense is designed to help with.

Source

Where this page information comes from.