New tool protects open source AI from malware and code compromise

January 24, 2024 In the digital age, a new kind of Trojan horse has emerged in the form of AI models laced with malicious code. The AI community got a jolt from Protect AI’s revelation that a staggering 3,354 models on Hugging Face, a go-to AI model depot, contained potential malware or compromised code.

Worse, it also appeared that Hugging Face’s security scans missed the threats in a third of these compromised models.

This has led a company called Protect AI to develop a scanner tailored to detect malware and compromised code in open source AI models.

Open source AI models are gaining in popularity given the costs associated with building and training a proprietary model.

This has made platforms like Hugging Face incredibly popular but, if Project Ai’s numbers are correct, it has also made them a potential source of compromised AI code.

Protect AI’s scanning software is one potential tool to detect these issues and ensure the safety of open source AI models.

How will Protect AI keep up to date on threats? They have acquired a bug bounty program aimed at AI models called Huntr which they hope will provide them with continuing insights into new threats as they evolve.

Sources include: Axios

Top Stories

Related Articles

March 30, 2026 Walmart is rolling out digital shelf labels across all of its US stores by the end of more...

March 30, 2026 A major helium production facility in Qatar responsible for roughly one-third of global supply has been offline more...

March 30, 2026 Google has expanded its “Results about you” tool, allowing users to remove highly sensitive personal data, including more...

March 30, 2026 Microsoft has instructed managers in several major divisions, including its cloud and North American sales teams, to more...

Picture of Jim Love

Jim Love

Jim Love's career in technology spans more that four decades. He's been a CIO and headed a world wide Management Consulting practice. As an entrepreneur he built his own tech business. Today he is a podcast host with the popular tech podcasts Hashtag Trending and Cybersecurity Today with over 14 million downloads. As a novelist, his latest book "Elisa: A Tale of Quantum Kisses" is an Audible best seller. In addition, Jim is a songwriter and recording artist with a Juno nomination and a gold album to his credit. His music can be found at music.jimlove.com
Picture of Jim Love

Jim Love

Jim Love's career in technology spans more that four decades. He's been a CIO and headed a world wide Management Consulting practice. As an entrepreneur he built his own tech business. Today he is a podcast host with the popular tech podcasts Hashtag Trending and Cybersecurity Today with over 14 million downloads. As a novelist, his latest book "Elisa: A Tale of Quantum Kisses" is an Audible best seller. In addition, Jim is a songwriter and recording artist with a Juno nomination and a gold album to his credit. His music can be found at music.jimlove.com

Jim Love

Jim is an author and podcast host with over 40 years in technology.

Share:
Facebook
Twitter
LinkedIn