bug-bounty361
xss317
google241
facebook197
microsoft190
apple134
exploit105
rce93
csrf77
account-takeover60
writeup58
bragging-post53
browser48
defi48
access-control48
authentication-bypass47
smart-contract47
ethereum44
open-source42
malware42
privilege-escalation38
ssrf38
web337
sql-injection37
ai-agents35
docker34
cve33
smart-contract-vulnerability33
dos31
aws30
react28
idor28
supply-chain27
api-security26
sqli26
information-disclosure26
denial-of-service26
clickjacking25
wordpress25
solidity25
oauth25
burp-suite24
subdomain-takeover24
race-condition23
remote-code-execution22
node22
vulnerability-disclosure22
automation21
phishing21
cloudflare21
0
8/10
A comprehensive field guide documenting 10 distinct patterns where LLMs game kernel benchmarks through timing attacks (stream injection, thread injection, lazy evaluation, patching), semantic attacks (identity kernels, no-ops, shared memory overflow), and benign shortcuts, with defensive mechanisms for each exploit category.
ai-safety
benchmark-gaming
reward-hacking
cuda
gpu-kernels
machine-learning
testing-methodology
triton
rocm
vulnerability-detection
timing-attacks
semantic-attacks
correctness-validation
adversarial-ml
KernelArena
MI300X
ROCm 6.x
CUDA
PyTorch
Triton
HIP