Skip to content

Hide Navigation Hide TOC

Vulnerability Scanning (79752061-aac1-4ed9-b7f3-3b4dc5e81280)

Vulnerability scanning is used to find potentially exploitable software vulnerabilities to remediate them.

File formats such as pickle files that are commonly used to store machine learning models can contain exploits that allow for arbitrary code execution. Both model artifacts and downstream products produced by models should be scanned for known vulnerabilities.

Cluster A Galaxy A Cluster B Galaxy B Level
Unsafe ML Artifacts (be6ef5c5-1ecb-486d-9743-42085bd2c256) MITRE ATLAS Attack Pattern Vulnerability Scanning (79752061-aac1-4ed9-b7f3-3b4dc5e81280) MITRE ATLAS Course of Action 1
Vulnerability Scanning (79752061-aac1-4ed9-b7f3-3b4dc5e81280) MITRE ATLAS Course of Action Backdoor ML Model (c704a49c-abf0-4258-9919-a862b1865469) MITRE ATLAS Attack Pattern 1
Unsafe ML Artifacts (be6ef5c5-1ecb-486d-9743-42085bd2c256) MITRE ATLAS Attack Pattern User Execution (ATLAS) (8c849dd4-5d15-45aa-b5b2-59c96a3ab939) MITRE ATLAS Attack Pattern 2