# checkpoint
5 articlestagged with “checkpoint”
Workflow Checkpoint Manipulation
Manipulating workflow checkpoints and savepoints for state rollback attacks.
exploitationcheckpointworkflowagenticmanipulation
Workflow Checkpoint Tampering
Modifying workflow state checkpoints to alter execution flow and bypass previously completed validation steps.
workflowcheckpointtampering
Checkpoint Manipulation Attacks
Intercepting and modifying model checkpoints during the fine-tuning process to inject persistent backdoors or remove safety properties.
fine-tuningcheckpointmanipulationpersistence
Checkpoint Manipulation Attacks (Training Pipeline)
Direct manipulation of model checkpoints and saved weights to inject backdoors or alter behavior.
training-pipelinecheckpointmanipulationweights
Model Checkpoint & Recovery Attacks
Checkpoint file format vulnerabilities, modification attacks on safetensors and PyTorch formats, checkpoint poisoning, storage security, and supply chain implications.
checkpointsafetensorspytorchmodel-weightssupply-chainpickleserialization