Innovation Hub

AI Threat Landscape Report 2025

Beyond MCP: Expanding Agentic Function Parameter Abuse

Summary HiddenLayer’s research team recently discovered a vulnerability in the Model Context Protocol (MCP) involving the abuse of its tool function parameters. This naturally led to the question: Is this a transferable vulnerability that could also be used to abuse function calls in language models that are not using MCP? The answer to this question […]

Exploiting MCP Tool Parameters

Summary HiddenLayer’s research team has uncovered a concerningly simple way of extracting sensitive data using MCP tools. Inserting specific parameter names into a tool’s function causes the client to provide corresponding sensitive information in its response when that tool is called. This occurs regardless of whether or not the inserted parameter is actually used by […]

Reports and Guides

AI Threat Landscape Report 2025

Download your copy of HiddenLayer's 2025 AI Threat Landscape Report to learn more about evolving AI vulnerabilities and how securing AI can fuel your organization's innovation

Reports & Guides

AI Threat Landscape Report 2025

HiddenLayer Named a Cool Vendor in AI Security

A Step-By-Step Guide for CISOS

SAI Security Advisory

CVE-2024-0129

NVIDIA NeMo Vulnerability Report

An attacker can craft a malicious model containing a path traversal and share it with a victim. If the victim uses an Nvidia NeMo version prior to r2.0.0rc0 and loads the malicious model, arbitrary files may be written to disk. This can result in code execution and data tampering.

CVE-2024-24590

Pickle Load on Artifact Get Leading to Code Execution

An attacker can create a pickle file containing arbitrary code and upload it as an artifact to a Project via the API. When a victim user calls the get method within the Artifact class to download and load a file into memory, the pickle file is deserialized on their system, running any arbitrary code it contains.

CVE-2024-24591

Path Traversal on File Download Leading to Arbitrary Write

An attacker can upload or modify a dataset containing a link pointing to an arbitrary file and a target file path. When a user interacts with this dataset, such as when using the Dataset.squash method, the file is written to the target path on the user’s system.

CVE-2024-24592

Improper Auth Leading to Arbitrary Read-Write Access

An attacker can, due to lack of authentication, arbitrarily upload, delete, modify, or download files on the fileserver, even if the files belong to another user.

CVE-2024-24593

Cross-site Request Forgery in ClearML Server

An attacker can craft a malicious web page that triggers a CSRF when visited. When a user browses to the malicious web page a request is sent which can allow an attacker to fully compromise a user’s account.

HiddenLayer in the News

HiddenLayer Unveils AISec Platform 2.0 to Deliver Unmatched Context, Visibility, and Observability for Enterprise AI Security

Austin, TX – April 22, 2025 – HiddenLayer, the leading provider of security for AI models and assets, today announced the release of AISec Platform 2.0, the platform with the most context, intelligence, and data for securing AI systems across the entire development and deployment lifecycle. Unveiled ahead of the RSAC Conference 2025, this upgrade […]

Cyera and HiddenLayer Announce Strategic Partnership to Deliver End-to-End AI Security

AUSTIN, Texas – April 23, 2025 – HiddenLayer, the leading security provider for AI models and assets, and Cyera, the pioneer in AI-native data security, today announced a strategic partnership to deliver end-to-end protection for the full AI lifecycle from the data that powers them to the models that drive innovation. As enterprises embrace AI […]

One Prompt Can Bypass Every Major LLM’s Safeguards