Skip to content

Hide Navigation Hide TOC

Vulnerability Scanning (e2cb599d-2714-4673-bc1a-976c471d7c58)

Vulnerability scanning is used to find potentially exploitable software vulnerabilities to remediate them.

File formats such as pickle files that are commonly used to store machine learning models can contain exploits that allow for arbitrary code execution.

Cluster A Galaxy A Cluster B Galaxy B Level
Unsafe ML Artifacts (d52b913b-808c-461d-8969-94cd5c9fe07b) MITRE ATLAS Attack Pattern Vulnerability Scanning (e2cb599d-2714-4673-bc1a-976c471d7c58) MITRE ATLAS Course of Action 1
User Execution (5e8e4108-beb6-479a-a617-323d425e5d03) MITRE ATLAS Attack Pattern Unsafe ML Artifacts (d52b913b-808c-461d-8969-94cd5c9fe07b) MITRE ATLAS Attack Pattern 2