Home/Signal
Signal

A reading list and a monthly digest.

Curated work shaping how I think about offensive security, ML supply chain, and the seams between them. The reading list is evergreen; the digest goes out monthly when there's something worth saying.

Reading list

Curated · 21 entries · 6 categories
Inference infrastructure & ML platforms
mcp-run-python: lack of isolation, MCP takeover, Deno SSRF
Natan Nehorai (JFrog)

Two CVEs (CVE-2026-25905, CVE-2026-25904) in a popular MCP server template. The class of bug is a useful pattern: trusting that a Deno sandbox plus a containerized python runner will hold under MCP-style invocation.

research.jfrog.com · February 2026
Uncovering memory corruption in NVIDIA Triton (as a new hire)
Will Vandevanter (Trail of Bits)

Two remotely-exploitable memory-corruption bugs (CVE-2025-23310, CVE-2025-23311) in Triton's HTTP request handling, surfaced via static analysis plus chunked-encoding probing. The reminder: production inference servers are still C/C++ network services with all the attendant historical bug classes, and authentication is off by default.

blog.trailofbits.com · August 2025
Breaking NVIDIA Triton: CVE-2025-23319 vulnerability chain to RCE
Wiz Research

A multi-stage vulnerability chain in the Triton Python backend, starting from a minor information leak about shared-memory region names and escalating to unauthenticated RCE. Useful as a case study in chaining low-severity primitives into a takeover.

wiz.io · August 2025
GGUF-SSTI: Llama-Drama and the Jinja template attack surface
JFrog Security Research

Reference for CVE-2024-34359 (the chat-template Jinja RCE in llama-cpp-python) and the broader question of when loading a GGUF model can lead to server-side template injection. The case study for why loader extensions need the same threat-modeling rigor as the loader itself.

research.jfrog.com · 2024

Monthly digest

First of the month

Monthly digest pending. First issue when there's something worth saying.