Submitter : c2a
Date: 11 January 2024
Bounty : 5,500
Vulnerabilities :
Programs :
Authors :
Link : https://johnstawinski.com/2024/01/11/playing-with-fire-how-we-executed-a-critical-supply-chain-attack-on-pytorch/