Stats and Bytes

Stats and Bytes

๐ŸŽฉ Top 5 Security and AI Reads - Week #30

Python supply chain chaos, vision-language model attacks, explainable vulnerability detection, flawed prompt injection research, and GNN binary analysis

Jul 27, 2025
โˆ™ Paid
Share

Welcome to the thirtieth installment of the Stats and Bytes Top 5 Security and AI Reads weekly newsletter. We're kicking off with an analysis of Python's software supply chain that uncovers dependency chaos across PyPI, revealing that over 141,000 packages potentially expose users to known vulnerabilities through their dependency chains. Next, we examine a resource exhaustion attack against large vision-language models that cleverly uses image perturbations to trigger infinite token loops, demonstrating yet another attack vector in the rapidly evolving multimodal AI landscape. We then explore an approach to vulnerability detection in C/C++ code that combines graph attention networks with explainability features, offering security analysts interpretable insights into why certain code patterns are flagged as vulnerable. Following that, we look at a paper I have completely dunked on proposing yet another LLM prompt injection attack that serves as a cautionary tale about the importance ofโ€ฆ

Keep reading with a 7-day free trial

Subscribe to Stats and Bytes to keep reading this post and get 7 days of free access to the full post archives.

Already a paid subscriber? Sign in
ยฉ 2025 Josh Collyer
Privacy โˆ™ Terms โˆ™ Collection notice
Start writingGet the app
Substack is the home for great culture