← back

Huntr: AI/ML Bug Bounty Platform for Open Source Security

Dec 9, 2025

securityaimlbug-bountyopen-sourcevulnerability-disclosure

Huntr is the world’s first bug bounty platform dedicated exclusively to AI/ML security. Backed by a community of 17,000+ security researchers, it focuses on finding vulnerabilities in open-source AI/ML tools, frameworks, model file formats, and foundation models.

History

Originally founded in 2020 by 418Sec’s Adam Nygate as huntr.dev, the platform was acquired by Protect AI in August 2023. By 2022, huntr had become the world’s 5th largest Certified Naming Authority (CNA) for CVEs.

How It Works

  1. Submit: Researchers find vulnerabilities and submit via huntr’s secure form
  2. Validate: Maintainers have 31 days to respond. Huntr reaches out every 7 days
  3. Reward: Valid reports earn bounties (up to $50,000 for critical findings)
  4. Publish: Reports go public after 90 days (extensions available)
  5. CVE: Valid open-source vulnerabilities are assigned CVE numbers

Bounties are paid monthly via Stripe Connect.

Two Bug Bounty Programs

Open Source Vulnerabilities (OSV)

Model File Vulnerabilities (MFV)

The AI Security Problem

The number of AI-related zero-days has tripled since November 2023. When huntr launched their AI/ML program, they received about 3 vulnerability reports per week. That grew to 15+ per day.

From Protect AI’s monthly vulnerability reports:

Notable Findings

Remote Code Execution (RCE) is the most prevalent threat—these vulnerable tools are downloaded thousands of times monthly to build enterprise AI systems.

Why It Matters

Open-source AI/ML tools often ship with vulnerabilities that can lead to complete system takeover. Unlike traditional software, AI systems introduce new attack surfaces:

Huntr fills a critical gap by providing structured disclosure and incentives for the AI security research community.

Getting Started

  1. Create an account at huntr.com
  2. Review the participation guidelines
  3. Check the bounties page for in-scope targets
  4. Submit findings through their secure form (no email submissions)

Sources