# secrets
標記為「secrets」的 12 篇文章
Cloud AI Secrets and Credential Management
Managing secrets, credentials, and sensitive configuration for cloud AI applications securely.
Secrets Rotation for Cloud AI Deployments
Implementing automated secrets rotation strategies for API keys, model endpoint credentials, and service accounts used in cloud AI/LLM deployments across AWS, Azure, and GCP.
Secrets Management for AI Applications
Managing API keys, model credentials, and sensitive configuration in AI application deployments.
CTF: Cloud AI Heist
Extract secrets from a cloud-deployed AI application by exploiting misconfigurations, SSRF, metadata endpoints, and model-level vulnerabilities in a realistic cloud environment.
Experiment Tracking Security
Security risks in ML experiment tracking systems: what gets logged, what is sensitive, and how tracking platforms become high-value targets for attackers seeking intellectual property and pipeline access.
Modal Serverless AI Deployment Testing
End-to-end walkthrough for security testing Modal serverless AI deployments: function enumeration, web endpoint exploitation, secret management assessment, volume security testing, and container escape analysis.
Cloud AI Secrets and Credential Management
Managing secrets, credentials, and sensitive configuration for cloud AI applications securely.
Secrets Rotation for Cloud AI Deployments
Implementing automated secrets rotation strategies for API keys, model endpoint credentials, and service accounts used in cloud AI/LLM deployments across AWS, Azure, and GCP.
Secrets Management for AI Applications
Managing API keys, model credentials, and sensitive configuration in AI application deployments.
CTF:雲端 AI 劫案
透過利用組態錯誤、SSRF、metadata 端點與模型層漏洞,從部署於雲端的 AI 應用中擷取機密。
實驗追蹤安全
ML 實驗追蹤系統中的安全風險:會被記錄什麼、哪些是敏感內容,以及追蹤平台為何成為攻擊者尋求智財與管線存取的高價值目標。
Modal Serverless AI Deployment Testing
End-to-end walkthrough for security testing Modal serverless AI deployments: function enumeration, web endpoint exploitation, secret management assessment, volume security testing, and container escape analysis.