Hacker News new | past | comments | ask | show | jobs | submit login

the majority of these are "an attacker can craft a model that causes problems."

Are people actually using tensorflow to run untrusted models?




Yes, eg ml developers and researchers test published or informally shared models.


Also, most ml apps don't treat model files with arbitrary-code-execution level precautions.




Consider applying for YC's W25 batch! Applications are open till Nov 12.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: