# trojans
2 articlestagged with “trojans”
Malicious Adapter Injection
How attackers craft LoRA adapters containing backdoors, distribute poisoned adapters through model hubs, and exploit adapter stacking to compromise model safety -- techniques, detection challenges, and real-world supply chain risks.
loraadapterbackdoorsupply-chaintrojansmodel-hubhugging-faceadapter-stacking
Malicious Adapter Injection
How attackers craft LoRA adapters containing backdoors, distribute poisoned adapters through model hubs, and exploit adapter stacking to compromise model safety -- techniques, detection challenges, and real-world supply chain risks.
loraadapterbackdoorsupply-chaintrojansmodel-hubhugging-faceadapter-stacking