bug-bounty372
xss317
google242
microsoft203
facebook197
apple137
exploit111
rce99
csrf78
malware62
account-takeover60
writeup59
bragging-post54
browser53
authentication-bypass52
access-control48
defi48
cve47
smart-contract47
ethereum44
privilege-escalation43
open-source42
sql-injection38
web338
ssrf38
ai-agents35
docker35
dos34
smart-contract-vulnerability33
aws33
supply-chain32
phishing30
idor30
react28
information-disclosure27
api-security26
denial-of-service26
solidity25
clickjacking25
cloudflare25
oauth24
sqli24
wordpress24
burp-suite24
race-condition23
node23
vulnerability-disclosure22
remote-code-execution22
web-security21
automation21
0
3/10
policy-analysis
This article argues that military AI adoption follows fundamentally different dynamics than civilian AI deployment—characterized by strategic competition, externalized failure costs, and top-down acceleration mandates—making it an 'abnormal technology' that requires distinct governance approaches rather than being treated as a gradual, market-driven innovation.
military-ai
ai-governance
autonomous-weapons
strategic-competition
risk-externalization
defense-acquisition
ai-deployment
policy-analysis
institutional-incentives
Anthropic
Claude
Pentagon
Arvind Narayanan
Sayash Kapoor
Israel
Hamas
Sudan
United States
China
Iran
Saudi Arabia
United Arab Emirates
CDAO
Google
OpenAI
xAI
Lavender
Habsora
Israeli Defense Forces