model-extraction-relu-logits
Warn
Audited by Socket on Feb 15, 2026
1 alert found:
SecuritySecuritySKILL.md
MEDIUMSecurityMEDIUM
SKILL.md
The content is a technically sound, actionable guide for extracting parameters of two-layer ReLU networks from query access. It is dual-use: valuable for legitimate security research, but readily usable for model theft and privacy/IP violations. The file does not contain obfuscated or malicious code, but it materially increases the risk to model owners by describing effective extraction techniques without any ethical guardrails or defensive guidance.
Confidence: 75%Severity: 85%
Audit Metadata