Saturday, May 2, 2026
  • About Web3Wire
  • Web3Wire NFTs
  • .w3w TLD
  • $W3W Token
  • Web3Wire DAO
  • Media Network
  • RSS Feed
  • Contact Us
Web3Wire
No Result
View All Result
  • Home
  • Web3
    • Latest
    • AI
    • Business
    • Blockchain
    • Cryptocurrencies
    • Decentralized Finance
    • Metaverse
    • Non-Fungible Token
    • Press Release
  • Technology
    • Consumer Tech
    • Digital Fashion
    • Editor’s Choice
    • Guides
    • Stories
  • Coins
    • Top 10 Coins
    • Top 50 Coins
    • Top 100 Coins
    • All Coins
  • Exchanges
    • Top 10 Crypto Exchanges
    • Top 50 Crypto Exchanges
    • Top 100 Crypto Exchanges
    • All Crypto Exchanges
  • Stocks
    • Blockchain Stocks
    • NFT Stocks
    • Metaverse Stocks
    • Artificial Intelligence Stocks
  • Events
  • News
    • Latest Crypto News
    • Latest DeFi News
    • Latest Web3 News
  • Home
  • Web3
    • Latest
    • AI
    • Business
    • Blockchain
    • Cryptocurrencies
    • Decentralized Finance
    • Metaverse
    • Non-Fungible Token
    • Press Release
  • Technology
    • Consumer Tech
    • Digital Fashion
    • Editor’s Choice
    • Guides
    • Stories
  • Coins
    • Top 10 Coins
    • Top 50 Coins
    • Top 100 Coins
    • All Coins
  • Exchanges
    • Top 10 Crypto Exchanges
    • Top 50 Crypto Exchanges
    • Top 100 Crypto Exchanges
    • All Crypto Exchanges
  • Stocks
    • Blockchain Stocks
    • NFT Stocks
    • Metaverse Stocks
    • Artificial Intelligence Stocks
  • Events
  • News
    • Latest Crypto News
    • Latest DeFi News
    • Latest Web3 News
No Result
View All Result
Web3Wire
No Result
View All Result
Home Artificial Intelligence

Pillar Security Uncovers Novel Attack Vector That Embeds Malicious Backdoors in Model Files on Hugging Face

July 9, 2025
in Artificial Intelligence, GlobeNewswire, Web3
Reading Time: 6 mins read
5
SHARES
244
VIEWS
Share on TwitterShare on LinkedInShare on Facebook

TEL EVIV, Israel, July 09, 2025 (GLOBE NEWSWIRE) — Pillar Security, a leading company in AI security, discovered a novel supply chain attack vector that targets the AI inference pipeline. This novel technique, termed “Poisoned GGUF Templates,” allows attackers to embed malicious instructions that are processed alongside legitimate inputs, compromising AI outputs.

The vulnerability affects the widely used GGUF (GPT-Generated Unified Format), a standard for AI deployment with over 1.5 million files distributed on public platforms like Hugging Face. By manipulating these templates, which define the conversational structure for an LLM, attackers can create a persistent compromise that affects every user interaction while remaining invisible to both users and security systems.

“We’re still in the early days of understanding the full range of AI supply chain security considerations,” said Ziv Karliner, CTO and Co-founder of Pillar Security. “Our research shows how the trust that powers platforms and open-source communities—while essential to AI progress—can also open the door to deeply embedded threats. As the AI ecosystem matures, we must rethink how AI assets are vetted, shared, and secured.”

Malicious GGUF Templates - Attack Surface - by Pillar Security

How the “Poisoned GGUF Template” Attack Works

This attack vector exploits the trust placed in community-sourced AI models and the platforms that host them. The mechanism allows for a stealthy, persistent compromise:

  • Attackers embed malicious, conditional instructions directly within a GGUF file’s chat template, a component that formats conversations for the AI model.
  • The poisoned model is uploaded to a public repository. Attackers can exploit the platform’s UI to display a clean template online while the actual downloaded file contains the malicious version, bypassing standard reviews.
  • The malicious instructions lie dormant until specific user prompts trigger them, at which point the model generates a compromised output.

“What makes this attack so effective is the disconnect between what’s shown in the repository interface and what’s actually running on users’ machines,” added Pillar’s Ariel Fogel, who led the research. “It remains undetected by casual testing and most security tools.”

The AI Inference Pipeline: A New Attack Surface

The “Poisoned GGUF Templates” attack targets a critical blind spot in current AI security architectures. Most security solutions focus on validating user inputs and filtering model outputs, but this attack occurs in the unmonitored space between them.

Because the malicious instructions are processed within the trusted inference environment, the attack evades existing defenses like system prompts and runtime monitoring. An attacker no longer needs to bypass the front door with a clever prompt; they can build a backdoor directly into the model file. This capability redefines the AI supply chain as a primary vector for compromise, where a single poisoned model can be integrated into thousands of downstream applications.

Responsible Disclosure

Pillar Security followed a responsible disclosure process, sharing its findings with vendors, including Hugging Face and LM Studio, in June 2025. The responses indicated that the platforms do not currently classify this as a direct platform vulnerability, placing the responsibility of vetting models on users. This stance highlights a significant accountability gap in the AI ecosystem.

Mitigation Strategies

The primary defense against this attack vector is the direct inspection of GGUF files to identify chat templates containing uncommon or non-standard instructions. Security teams should immediately:

  • Audit GGUF Files: Deploy practical inspection techniques to examine GGUF files for suspicious template patterns. Look for unexpected conditional logic (if/else statements), hidden instructions, or other manipulations that deviate from standard chat formats.
  • Move Beyond Prompt-Based Controls: This attack fundamentally challenges current AI security assumptions. Organizations must evolve beyond a reliance on system prompts and input/output filtering toward comprehensive template and processing pipeline security.
  • Implement Provenance and Signing: A critical long-term strategy is to establish model provenance. This can include developing template allowlisting systems to ensure only verified templates are used in production.

The Pillar platform discovers and flags malicious GGUF files and other types of risks in the template layer.

Read the full report: https://www.pillar.security/blog/llm-backdoors-at-the-inference-level-the-threat-of-poisoned-templates

About Pillar Security

Pillar Security is a leading AI-security platform, providing companies full visibility and control to build and run secure AI systems. Founded by experts in offensive and defensive cybersecurity, Pillar secures the entire AI lifecycle – from development to deployment – through AI Discovery, AI Security Posture Management (AI-SPM), AI Red Teaming, and Adaptive Runtime Guardrails. Pillar empowers organizations to prevent data leakage, neutralize AI-specific threats, and comply with evolving regulations.

Contact person:

Hadar Yakir
info@pillar.security

A photo accompanying this announcement is available at https://www.globenewswire.com/NewsRoom/AttachmentNg/d767a026-13f9-419d-827f-7ade3b92a24d

About Web3Wire
Web3Wire – Information, news, press releases, events and research articles about Web3, Metaverse, Blockchain, Artificial Intelligence, Cryptocurrencies, Decentralized Finance, NFTs and Gaming.
Visit Web3Wire for Web3 News and Events, Block3Wire for the latest Blockchain news and Meta3Wire to stay updated with Metaverse News.
ShareTweet1ShareSendShare2
Previous Post

DNSBTC Cloud Mining Provider Provides Global Cryptocurrency Investors With the Potential to Earn Daily Crypto Income Through BTC, DOGE, LTC Free Mining Machines

Next Post

Covasant Technologies Announces Strategic Merger with Texas-based konaAI, and California-based DCube Data Sciences Corp to Drive Accelerated Agentic AI Adoption in Enterprise Risk Management

Related Posts

TSS to Host First Quarter 2026 Earnings Conference Call on May 7, 2026

GEORGETOWN, TX / ACCESS Newswire / May 1, 2026 / TSS, Inc. (Nasdaq:TSSI), a data center services company that integrates AI and other high-performance computing infrastructure and software and provides related data center services, will report its 2026 first quarter financial results on Thursday, May 7, 2026. The Company will...

Read moreDetails

High Dynamic Range Camera Portfolio: How 120+ dB HDR Solves Outdoor Imaging Challenges

From smart city surveillance to fleet management, Vadzo Imaging explains how sensor-level High Dynamic Range eliminates detail loss in real outdoor deployments. FORT WORTH, TX / ACCESS Newswire / May 1, 2026 / Vadzo Imaging, a globally trusted provider of high-performance embedded vision systems, today publishes a definitive technical breakdown...

Read moreDetails

Vadzo Imaging Launches MIPI Camera Integration Service with Driver Development for Embedded SoC Platforms

Vadzo Imaging's MIPI Camera Integration Service covers Linux camera driver development and MIPI CSI-2 camera bring-up across leading SoC platforms, including NVIDIA Jetson, Raspberry Pi, and NXP i.MX, and Qualcomm RB series, with full support extended to custom SoC environments and the complete Bolt MIPI camera series. FORT WORTH, TX...

Read moreDetails

Roadzen to Attend Nordics’ Leading Automotive Event VECS 2026 in Gothenburg on May 5–6

Roadzen will join senior AI, automaker and mobility executives at a private, invite-only reception hosted by Business Sweden at the World of Volvo on May 4, ahead of VECS 2026, the Nordics' flagship automotive conference, as Europe emerges as a major market for the Company on the back of two...

Read moreDetails

StellarSpace Unveils New-Generation Industrial Automation Products at Silicon Valley Launch Event

SANTA CLARA, Calif., May 01, 2026 (GLOBE NEWSWIRE) -- StellarSpace, a global pioneer in industrial automation, officially launched its full-stack industrial intelligence product portfolio at the inaugural Global Embodied Intelligence AI Innovation Summit (GEIS) in Silicon Valley on April 28. At the highly anticipated event, StellarSpace unveiled a suite of...

Read moreDetails

Free AI Crypto Trading App by AriseAlpha: Smart Automated Trading in 2026

NEW YORK, NY, May 01, 2026 (GLOBE NEWSWIRE) -- As financial markets become increasingly data-driven, investors are looking for more efficient ways to manage trading and investment strategies. AriseAlpha has announced the launch of its free AI crypto trading app, designed to simplify automated investing across both cryptocurrency and stock markets. The platform integrates advanced AI...

Read moreDetails

Bitdeer Announces First Quarter 2026 Earnings Conference Call for May 14th 2026

SINGAPORE, May 01, 2026 (GLOBE NEWSWIRE) -- Bitdeer Technologies Group (Nasdaq: BTDR) (“Bitdeer” or the “Company”), a world-leading technology company for Bitcoin mining and AI infrastructure, today announced that it has scheduled its first quarter 2026 earnings conference call and webcast for Thursday, May 14, 2026 at 8:00 AM EST. During...

Read moreDetails

Berry AI and Culver’s Announce Brand-Wide Vision AI Deployment Across 1,000+ Restaurants

San Jose, CA, May 01, 2026 (GLOBE NEWSWIRE) -- Berry AI, the leading provider of Vision AI technology for the quick-service restaurant (QSR) industry, today announced a nationwide partnership with Culver’s restaurants, deploying its real-time visibility intelligence platform across the brand’s entire portfolio: more than 1,000 locations nationwide. Berry AI...

Read moreDetails

Sony STARVIS vs STARVIS 2: Low-Light SNR, NIR Sensitivity, and HDR Camera Performance Explained

From traffic monitoring to ICU patient monitoring and perimeter security, Vadzo Imaging breaks down the sensor-level differences between STARVIS and STARVIS 2, and the camera portfolio built around each. FORT WORTH, TX / ACCESS Newswire / May 1, 2026 / Vadzo Imaging, a globally trusted provider of high-performance embedded vision...

Read moreDetails

21CS Welcomes Clemencia “Cleo” Clarke as Chief Commercial Officer

MOREHEAD CITY, NC / ACCESS Newswire / May 1, 2026 / 21st Century Software Technologies, Inc. (21CS) is pleased to announce the appointment of Clemencia "Cleo" Clarke as Chief Commercial Officer. In this role, Clarke will lead the company's global commercial strategy, including sales execution, go‑to‑market initiatives, alliance development, and...

Read moreDetails
Web3Wire NFTs - The Web3 Collective

Web3Wire, $W3W Token and .w3w tld Whitepaper

Web3Wire, $W3W Token and .w3w tld Whitepaper

Claim your space in Web3 with .w3w Domain!

Web3Wire

Trending on Web3Wire

  • Top Cross-Chain DeFi Solutions to Watch by 2025

    87 shares
    Share 35 Tweet 22
  • 74Software completes refinancing of its Term Loans and Revolving Credit Facility

    6 shares
    Share 2 Tweet 2
  • Unifying Blockchain Ecosystems: 2024 Guide to Cross-Chain Interoperability

    160 shares
    Share 64 Tweet 40
  • Top 5 Wallets for Seamless Multi-Chain Trading in 2025

    83 shares
    Share 33 Tweet 21
  • Discover 2025’s Top 5 Promising Low-Cap Crypto Gems

    98 shares
    Share 39 Tweet 25
Join our Web3Wire Community!

Our newsletters are only twice a month, reaching around 10000+ Blockchain Companies, 800 Web3 VCs, 600 Blockchain Journalists and Media Houses.


* We wont pass your details on to anyone else and we hate spam as much as you do. By clicking the signup button you agree to our Terms of Use and Privacy Policy.

Web3Wire Podcasts

Upcoming Events

There are currently no events.

Latest on Web3Wire

  • TSS to Host First Quarter 2026 Earnings Conference Call on May 7, 2026
  • High Dynamic Range Camera Portfolio: How 120+ dB HDR Solves Outdoor Imaging Challenges
  • Optex Systems Announces Lionel Liebman as Director of Optical Engineering
  • Vadzo Imaging Launches MIPI Camera Integration Service with Driver Development for Embedded SoC Platforms
  • The Community Cat Debate is Being Decided Without Data. The Whisker Tracker App Wants to Change That.

RSS Latest on Block3Wire

  • The Algorithmic Monographs: A Five-Volume Civil Code for the Age of Autonomous Intelligence
  • Ali Sadhik Shaik: Practitioner, Scholar, and Author – Focused on the Governance of Intelligent Systems
  • The Klyrox Protocol: A Decentralized Framework to Close the AI Accountability Gap
  • Covo Finance: Revolutionary Crypto Leverage Trading Platform
  • WorldStrides and HEX Announce Partnership to Offer High School and University Students Innovative Courses Designed to Improve Their Outlook in the Digital Age

RSS Latest on Meta3Wire

  • The Algorithmic Monographs: A Five-Volume Civil Code for the Age of Autonomous Intelligence
  • Ali Sadhik Shaik: Practitioner, Scholar, and Author – Focused on the Governance of Intelligent Systems
  • The Klyrox Protocol: A Decentralized Framework to Close the AI Accountability Gap
  • Thumbtack Honored as a 2023 Transform Awards Winner
  • Accenture Invests in Looking Glass to Accelerate Shift from 2D to 3D
Web3Wire

Web3Wire is your go-to source for the latest insights and updates in Web3, Metaverse, Blockchain, AI, Cryptocurrencies, DeFi, NFTs, and Gaming. We provide comprehensive coverage through news, press releases, event updates, and research articles, keeping you informed about the rapidly evolving digital world.

  • About Web3Wire
  • Founder’s Note
  • Web3Wire NFTs – The Web3 Collective
  • .w3w TLD
  • $W3W Token
  • Web3Wire DAO
  • Event Partners
  • Community Partners
  • Our Media Network
  • Media Kit
  • RSS Feeds
  • Contact Us

Crypto Coins

  • Top 10 Coins
  • Top 50 Coins
  • Top 100 Coins
  • All Coins – Marketcap
  • Crypto Coins Heatmap

Crypto Exchanges

  • Top 10 Exchanges
  • Top 50 Exchanges
  • Top 100 Exchanges
  • All Crypto Exchanges

Crypto Stocks

  • Blockchain Stocks
  • NFT Stocks
  • Metaverse Stocks
  • Artificial Intelligence Stocks

Web3Wire Whitepaper | Tokenomics

Web3 Resources

  • Top Web3 and Crypto Youtube Channels
  • Latest Crypto News
  • Latest DeFi News
  • Latest Web3 News

Blockchain Resources

  • Blockchain and Web3 Resources
  • Decentralized Finance (DeFi) – Research Reports
  • All Crypto Whitepapers

Metaverse Resources

  • AR VR and Metaverse Resources
  • Metaverse Courses
Claim your space in Web3 with .w3w!

The Klyrox Protocol | The Algorithmic Monographs

Top 50 Web3 Blogs and Websites
Web3Wire Podcast on Spotify Web3Wire Podcast on Amazon Music 
Web3Wire - Web3 and Blockchain - News, Events and Press Releases | Product Hunt
Web3Wire on Google News

Media Portfolio: Block3Wire | Meta3Wire

  • Privacy Policy
  • Terms of Use
  • Disclaimer
  • Sitemap
  • For Search Engines
  • Crypto Sitemap
  • Exchanges Sitemap

© 2024 Web3Wire. We strongly recommend our readers to DYOR, before investing in any cryptocurrencies, blockchain projects, or ICOs, particularly those that guarantee profits.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

No Result
View All Result
  • Coins
    • Top 10 Cryptocurrencies
    • Top 50 Cryptocurrencies
    • Top 100 Cryptocurrencies
    • All Coins
  • Exchanges
    • Top 10 Cryptocurrency Exchanges
    • Top 50 Cryptocurrency Exchanges
    • Top 100 Cryptocurrency Exchanges
    • All Crypto Exchanges
  • Stocks
    • Blockchain Stocks
    • NFT Stocks
    • Metaverse Stocks
    • Artificial Intelligence Stocks

© 2024 Web3Wire. We strongly recommend our readers to DYOR, before investing in any cryptocurrencies, blockchain projects, or ICOs, particularly those that guarantee profits.

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.