Navigating AI/ML Bug Bounty Hunting: Lessons from Hunting Pickle Deserialization Vulnerabilities

Introduction You know what’s better than just using AI/ML systems? Breaking...

GGUF File Format Vulnerabilities: A Guide for Hackers

Introduction As machine learning continues to rise in prominence, so does the need for...

Spotlight on m0kr4n3: Hacking AI/ML Systems with a CTF Mindset

Introduction At huntr, we’ve got a thing for celebrating the hackers and researchers...

Spotlight on acciobugs: Uncovering Improper Access Control Vulnerabilities in lunary-ai/lunary

Introduction At huntr, we love to celebrate the incredible talent in our community who...

Spotlight on hainguyen0207: Tackling AI/ML Exploits in LOLLMS Through Huntr

Introduction At huntr, we take pride in showcasing the brilliant minds contributing to a...

Spotlight on mnqazi: Critical Findings in ChuanhuChatGPT and AI/ML Security

Introduction At huntr, we love to celebrate the incredible talent working with us to...

Spotlight on PinkDraconian: From CTFs to huntr – A Hacker's Path

Intro At huntr, we love to celebrate the incredible talent working with us to build a...

Spotlight on zpbrent: Uncovering AI Vulnerabilities with huntr

Introduction At huntr, we love to celebrate the incredible talent working with us to...