Madison Vorbrich

Posts by: Madison Vorbrich

Spotlight on taiphung217: Five-Month Climb to Huntr Leaderboard Glory

Introduction Some researchers dip their toes into AI/ML security. Phung Van Tai (aka @taiphung217) cannonballed in. Valedictorian of Vietnam’s Academy of Cryptography Techniques and now an AppSec engineer at OneMount Group, Tai...

Spotlight on Lyutoon: From Black Hat to Bug Bounties

Introduction Some Ph.D. candidates stay up late fine-tuning models. Tong Liu (aka Lyutoon) stays up late trying to break them. At huntr, we’ve got a thing for spotlighting hackers. This month, the...

Pivoting Archive Slip Bugs into High-Value AI/ML Bounties

Many ML model files— .nemo, .keras, .gguf, even trusty .pth— are just zip/tar archives in disguise. Feed one to a loader that blindly calls extractall()and pow, you’ve opened the door to an...

Spotlight on winters0x64: Leveraging CTF Skills for AI/ML Bug Bounty Success

Introduction Some people skipped online classes during lockdown to binge Netflix. Arun Krishnan skipped them to hack around on cheats for an online game—and ended up chasing bug bounties. This month, we're...

Pkl Rick’d: How Loading a .pkl File Can Lead to RCE

Sometimes the simplest bugs are the most dangerous — especially when they’ve been hiding in plain sight. This one’s a classic pattern: pickle.load() + unsafe deserialization = RCE. Let’s unpack a clean,...

Navigating AI/ML Bug Bounty Hunting: Lessons from Hunting Pickle Deserialization Vulnerabilities

Introduction You know what’s better than just using AI/ML systems? Breaking them—ethically, of course. Peng Zhou (aka zpbrent), one of our huntrs, did exactly that when he explored a popular AI hub...

GGUF File Format Vulnerabilities: A Guide for Hackers

Introduction As machine learning continues to rise in prominence, so does the need for secure file formats and libraries to store and load model weights. One such format, GGUF, has gained popularity...

Spotlight on m0kr4n3: Hacking AI/ML Systems with a CTF Mindset

Introduction At huntr, we’ve got a thing for celebrating the hackers and researchers shaking things up in AI/ML security. So this time, we're throwing the spotlight on Mokrane Abdelmalek (aka m0kr4n3)—a sharp...

Spotlight on acciobugs: Uncovering Improper Access Control Vulnerabilities in lunary-ai/lunary

Introduction At huntr, we love to celebrate the incredible talent in our community who are helping secure the future of AI/ML systems. Today, we’re excited to spotlight Ileana Barrionuevo, known as @acciobugs...

Spotlight on hainguyen0207: Tackling AI/ML Exploits in LOLLMS Through Huntr

Introduction At huntr, we take pride in showcasing the brilliant minds contributing to a safer, AI-powered world. Among our growing community of over 15,000 hackers and security researchers, Nguyen Van Hai (known...

Spotlight on mnqazi: Critical Findings in ChuanhuChatGPT and AI/ML Security

Introduction At huntr, we love to celebrate the incredible talent working with us to build a safer AI-powered world. Our community of over 15,000 hackers and threat researchers are constantly uncovering and...

Spotlight on PinkDraconian: From CTFs to huntr – A Hacker's Path

Intro At huntr, we love to celebrate the incredible talent working with us to build a safer AI powered world. Our community of over 15,000 hackers and threat researchers are constantly uncovering...