To access material, start machines and answer questions login.
This is your next chapter at TryTrainMe. In the Supply Chain Attack Vectors room, your investigation confirmed the breach: a malicious pickle, a fake repository, and . Your work impressed the board. You have been promoted to Security Engineer and given the mandate to build an internal supply chain security testing lab (SupplySecLab) so nothing like this gets through again.
SupplySecLab closes each gap from that incident:
- No policy governed which model formats were acceptable; in Task 2 you will see how to address this
- The model's was never verified before deployment; Task 3 shows you how to change that
- The model was never scanned before it entered the pipeline; Tasks 4 and 5 walk you through the tools that catch this
- Hidden logic inside the model's architecture went undetected; in Tasks 6 and 7 you will learn how to find it
- A malicious package slipped through because dependencies were never audited; Task 8 covers how to prevent this
- The production system ran on an external prompt that was never reviewed; Task 9 shows you how to assess and govern this
Learning Objectives
- Use SafeTensors and
weights_only=Trueto eliminate the pickle-based code execution risks introduced in Supply Chain Attack Vectors - Verify model using checksums and model card review
- Scan models with Fickling and ModelScan to detect malicious content before deployment
- Audit dependencies with pip-audit and generate Software Bills of Materials (SBOMs) with Syft
- Assess providers against a supply chain security checklist and establish behaviour monitoring controls
Tasks in this room use a for and Agents for live analysis and provider assessment.
Prerequisites
- Completed Understanding Supply Chains (supply chain concepts)
- Completed Supply Chain Attack Vectors (malicious models, , repository attacks)
- Recommended: / Security Threats (foundational security concepts)
Framework Alignment
This room maps to LLM03: Supply Chain Vulnerabilities (opens in new tab), AML.T0010 ( Supply Chain Compromise), and RMF Govern 1.2, Measure 2.2, and Manage 2.1.
I'm ready to build my defences.
Ready to learn Cyber Security?
The Securing the AI Supply Chain room is only available for premium users. Signup now to access more than 500 free rooms and learn cyber security through a fun, interactive learning environment.
Already have an account? Log in