
Boschko
@olivier_boschko
Followers
4K
Following
20K
Media
199
Statuses
2K
just a french canadien | ai red team @HiddenLayerSec | CISSP BSCP CRTL CRTO OSCP eWPTX eCPPT | goofing off @ https://t.co/aWC0YYEp9x
Oppinions are my own
Joined February 2017
New blog just dropped 🤠 I've spent hours boiling down why adversarial examples fundamentally exist, distilled down to technical crystal-clear explanations anyone can grasp. This is what I wish someone had given me months ago. Give it a read ❤️ .
boschko.ca
Explore why adversarial examples fundamentally exist & why models are often wrong almost everywhere.
5
30
90
My old team is hiring! Its one of best internal Red Teams IYKYK. Lots of complex & challenging ops in an environment with $1B/yr cyber spend. Huge training budgets & all the toys/gadgets money can buy 😎 the team is seriously amazing. Check out the posting for more details.
🇨🇦🚀 RBC Adversary Emulation is hiring! We're looking for a mid- to senior-level penetration tester / red team operator with a strong consulting background. 📍Toronto (preferred) or anywhere in Canada.
4
3
31
Great research 🔥 pretty insane level of risk to leave your users exposed to for months. Not implementing an immediate fix & waiting on protocol upgrade feels kinda shitty. The full article + triage timeline & conversation is worth the read.
On Feb 17 2025 I reported a critical vulnerability to @Scroll_ZKP. $100m+ in TVL was at risk for more than 2 months. Anyone could force Scroll L2 into an indefinite re-org, halting the chain so that no user transactions would be included in blocks and the chain would not move.
0
1
10
Check out @hiddenlayersec newest transferable & universal prompt attack technique coined "Policy Puppetry". It's hot out of the oven & ready for you to use on your next red team 🔥.
hiddenlayer.com
HiddenLayer’s latest research uncovers a universal prompt injection bypass impacting GPT-4, Claude, Gemini, and more, exposing major LLM security gaps.
0
6
28
Happy to announce that I've joined the world's best @HiddenLayerSec! 🔥 I'm absolutely pumped to be securing AI with this insanely stacked & talented team. Good times on the horizon 😎.
13
0
66
Finally finished reading 🤯 this is 100% a must read. I dont know of anyone else who's consistently finding insane vulns in AI/ML projects & posting writeups/sharing their thought process. Patrick doesn't miss 🎯.
My 10k-word writeup on exploiting a heap-overflow in Llama.cpp's RPC Server's Tensor-operation to RCE. This by far is one of the most challenging but fun exploitation I've ever researched on.
1
1
34
Dopped a spicy 25-min read exploring adversarial ML 🤠 It's a mix of in-depth & light peppering of the broader field. So much I couldn’t fit (extraction, inversion, poisoning), but I hope it sparks curiosity. Made for learners no fancy background ❤️.
boschko.ca
Explore adversarial attacks on AI/ML models through hands-on challenges on Dreadnode’s Crucible CTF platform.
13
69
210
My colleague @0xd3adbeef_ just published a great blog outlining his methodology in discovering CVE-2024-31227, a DoS in Redis (7.0-7.2.4). It's a great writeup covering fuzzing techniques with AFL++ & writing harnesses for network services .
0
27
82
Okay, I'll stop glazing @dreadnode after this post, but their CTF platform Crucible for adversarial AI/LLM is HANDS DOWN the best out there. It’s free, the challenges are incredible! Truly the perfect place to apply your skills and keep learning 💯🔥
1
8
59
I've done a heaps of trainings and far too many courses & yet none compare to @dreadnode adversarial Ml training taught by @moo_hax & @monoxgas. This course has been an absolute slingshot into developing non-bullshit AI/ML red teaming capabilities.
0
1
13