The worldwide AI race is in full swing, and its battleground? HuggingFace
It took eight years for the platform to succeed in 1 million fashions, however solely 9 months later, this determine will seemingly double (1.8 million on the time of writing).
Mannequin suppliers of all origins – private and non-private, home and international, trusted and unverified – are leveraging the open-source platform to succeed in builders instantly, making a deluge of state-of-the-art AI for numerous domains (together with cybersecurity).
With an open-source AI provide chain comes AI provide chain dangers, as talked about in our February dialogue on the three pillars of this rising assault floor:
- Software program (software program library vulnerabilities, AI framework vulnerabilities)
- Mannequin (embedded malware inside mannequin information, architectural backdoors)
- Knowledge (poisoning throughout coaching processes, licensing and compliance points)
Bringing AI Provide Chain Safety to Cisco
To assist organizations eradicate these dangers robotically, the Basis AI risk intelligence staff has produced Cerberus, a 24/7 guard for the AI provide chain. Cerberus analyzes fashions as they enter HuggingFace, sharing ends in standardized risk feeds that Cisco Safety merchandise use to construct and implement granular entry insurance policies for the AI provide chain.
In February, we introduced our integration with Cisco Safe Endpoint and Safe Electronic mail to allow automated blocking of recognized malicious information throughout learn/write/modify operations in addition to e-mail attachments containing malicious AI Provide Chain Safety artifacts as attachments.
In June, we introduced our integration with Cisco Safe Entry Safe Internet Gateway so as to add the next enhancements:
- Block downloads of doubtless compromised AI fashions – Cisco repeatedly scans public repositories like Hugging Face for malicious code and vulnerabilities inside AI mannequin information. When potential threats in a repository are detected, obtain entry for these information is revoked.
- Test for license compliance – Detect and block AI fashions with dangerous or restrictive open-source software program licenses—corresponding to copyleft licenses like GPL—that pose mental property (IP) and compliance dangers. This helps to make sure authorized adherence and avoids inadvertent IP violations.
- Block downloads of fashions from non-approved sources – Flag and implement insurance policies on AI fashions that originate from unapproved distributors, e.g., from geopolitically delicate areas (e.g., DeepSeek). Keep compliance and mitigate potential dangers primarily based on potential geopolitical liabilities.
The way it Works


Cerberus watches HuggingFace instantly in a steady, automated cycle:
- Hugging Face sends Cerberus notifications about mannequin and information repository updates
- Cerberus scans these up to date repositories for potential dangers.
- Any detected dangers are compiled right into a report, alongside provenance metadata (e.g., file hashes, CDN routes).
- Menace feeds containing the most recent reviews are fed on to our companions inside Cisco’s Safety Enterprise Group.
Our standardized risk feeds robotically enrich present alerting and coverage creation inside Cisco Safety merchandise – no guide intervention required.
What Varieties of Danger Are Coated?
Cerberus makes use of a mixture of metadata evaluation, sandboxing, pickle file inspection, and different methods to test for dangers together with, however not restricted to:
- Code Execution: Trying to run code, often through the object deserialization course of (e.g., by way of builtins.eval and even pwntools)
- Architectural Backdoors: Trying to leverage architectural flexibility to run code (e.g., Keras Lambda layer)
- System Entry: Trying to realize management of the mother or father system (e.g., by way of posix).
- Community Entry: Trying to speak with exterior purchasers, prone to exfiltrate information or set up a remote-control channel (e.g., by way of material.connection or twisted.web)
- Obfuscation Vulnerabilities: Trying to obfuscate code, prone to keep away from detection (e.g., nested pickling by way of torch.serialization)
- Compliance: Licenses with dangerous or restrictive clauses (e.g., GPL).
- Prohibited Suppliers: Suppliers that originate from geopolitically delicate areas, which may trigger legal responsibility points with prospects.
How are Insurance policies Enforced?
Our integrations with Cisco Safety merchandise present a number of enforcement factors:
- Safe Entry Safe Internet Gateway (SWG) blocks customers trying to obtain probably compromised fashions instantly from HuggingFace.
- Safe Electronic mail blocks emails containing probably compromised fashions as attachments.
- Safe Endpoint protects the top consumer’s filesystem by blocking learn/write/modification to probably compromised fashions.
Staying Forward of Rising Threats
Speedy world competitors at each stage of the AI worth chain is creating numerous alternatives for organizations. It follows that cybersecurity practitioners should function with much more pace and leverage to maintain up with all of the new: new fashions, new instruments, and basically new methods of software program improvement the place brokers play an energetic position in designing, writing, and reviewing code.
The Basis AI staff is devoted to constructing AI that unlocks better pace and leverage for defenders.
Keep tuned for extra updates, and be at liberty to ship us a message!
We’d love to listen to what you suppose! Ask a query and keep linked with Cisco Safety on social media.
Cisco Safety Social Media
Share: