# tecton
2 articlestagged with “tecton”
Manipulating Feature Stores
Advanced techniques for attacking feature stores used in ML systems, including feature poisoning, schema manipulation, serving layer exploitation, and integrity attacks against platforms like Feast, Tecton, and Databricks Feature Store.
feature-storedata-poisoningfeasttectonml-infrastructure
Feature Store Security (Llmops Security)
Security overview of ML feature stores (Feast, Tecton, Vertex Feature Store): architecture and trust model, attack surfaces in online and offline stores, and the security implications of centralized feature management for ML systems.
feature-storefeasttectonvertexonline-storeoffline-storefeature-engineering