<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <atom:link href="https://vulnwatch.ai/feed" rel="self" type="application/rss+xml" />
        <title><![CDATA[VulnWatch — AI Security Tracker]]></title>
        <link><![CDATA[https://vulnwatch.ai/feed]]></link>
        <description><![CDATA[Curated AI/ML security vulnerabilities, advisories, and breach disclosures.]]></description>
        <language>en-US</language>
        <pubDate>Wed, 22 Apr 2026 18:00:07 +0000</pubDate>

                    <item>
                <title><![CDATA[CVE-2026-35366: The printenv utility in uutils coreutils fails to display environment variables containing invalid UTF-8 byte sequences.]]></title>
                <link>https://nvd.nist.gov/vuln/detail/CVE-2026-35366</link>
                <description><![CDATA[The printenv utility in uutils coreutils fails to display environment variables containing invalid UTF-8 byte sequences. While POSIX permits arbitrary bytes in environment strings, the uutils implementation silently skips these entries rather than printing the raw bytes. This vulnerability allows malicious environment variables (e.g., adversarial LD_PRELOAD values) to evade inspection by administrators or security auditing tools, potentially allowing library injection or other environment-based attacks to go undetected.]]></description>
                <author><![CDATA[VulnWatch]]></author>
                <pubDate>Wed, 22 Apr 2026 18:00:07 +0000</pubDate>
                            </item>
                    <item>
                <title><![CDATA[CVE-2026-6859: A flaw was found in InstructLab. The `linux_train.py` script hardcodes `trust_remote_code=True` when loading models from]]></title>
                <link>https://nvd.nist.gov/vuln/detail/CVE-2026-6859</link>
                <description><![CDATA[A flaw was found in InstructLab. The `linux_train.py` script hardcodes `trust_remote_code=True` when loading models from HuggingFace. This allows a remote attacker to achieve arbitrary Python code execution by convincing a user to run `ilab train/download/generate` with a specially crafted malicious model from the HuggingFace Hub. This vulnerability can lead to complete system compromise.]]></description>
                <author><![CDATA[VulnWatch]]></author>
                <pubDate>Wed, 22 Apr 2026 18:00:07 +0000</pubDate>
                            </item>
                    <item>
                <title><![CDATA[CVE-2026-31507: In the Linux kernel, the following vulnerability has been resolved:

net/smc: fix double-free of smc_spd_priv when tee()]]></title>
                <link>https://nvd.nist.gov/vuln/detail/CVE-2026-31507</link>
                <description><![CDATA[In the Linux kernel, the following vulnerability has been resolved:

net/smc: fix double-free of smc_spd_priv when tee() duplicates splice pipe buffer

smc_rx_splice() allocates one smc_spd_priv per pipe_buffer and stores
the pointer in pipe_buffer.private.  The pipe_buf_operations for these
buffers used .get = generic_pipe_buf_get, which only increments the page
reference count when tee(2) duplicates a pipe buffer.  The smc_spd_priv
pointer itself was not handled, so after tee() both the original and the
cloned pipe_buffer share the same smc_spd_priv *.

When both pipes are subsequently released, smc_rx_pipe_buf_release() is
called twice against the same object:

  1st call: kfree(priv)  sock_put(sk)  smc_rx_update_cons()  [correct]
  2nd call: kfree(priv)  sock_put(sk)  smc_rx_update_cons()  [UAF]

KASAN reports a slab-use-after-free in smc_rx_pipe_buf_release(), which
then escalates to a NULL-pointer dereference and kernel panic via
smc_rx_update_consumer() when it chases the freed priv->smc pointer:

  BUG: KASAN: slab-use-after-free in smc_rx_pipe_buf_release+0x78/0x2a0
  Read of size 8 at addr ffff888004a45740 by task smc_splice_tee_/74
  Call Trace:
   <TASK>
   dump_stack_lvl+0x53/0x70
   print_report+0xce/0x650
   kasan_report+0xc6/0x100
   smc_rx_pipe_buf_release+0x78/0x2a0
   free_pipe_info+0xd4/0x130
   pipe_release+0x142/0x160
   __fput+0x1c6/0x490
   __x64_sys_close+0x4f/0x90
   do_syscall_64+0xa6/0x1a0
   entry_SYSCALL_64_after_hwframe+0x77/0x7f
   </TASK>

  BUG: kernel NULL pointer dereference, address: 0000000000000020
  RIP: 0010:smc_rx_update_consumer+0x8d/0x350
  Call Trace:
   <TASK>
   smc_rx_pipe_buf_release+0x121/0x2a0
   free_pipe_info+0xd4/0x130
   pipe_release+0x142/0x160
   __fput+0x1c6/0x490
   __x64_sys_close+0x4f/0x90
   do_syscall_64+0xa6/0x1a0
   entry_SYSCALL_64_after_hwframe+0x77/0x7f
   </TASK>
  Kernel panic - not syncing: Fatal exception

Beyond the memory-safety problem, duplicating an SMC splice buffer is
semantically questionable: smc_rx_update_cons() would advance the
consumer cursor twice for the same data, corrupting receive-window
accounting.  A refcount on smc_spd_priv could fix the double-free, but
the cursor-accounting issue would still need to be addressed separately.

The .get callback is invoked by both tee(2) and splice_pipe_to_pipe()
for partial transfers; both will now return -EFAULT.  Users who need
to duplicate SMC socket data must use a copy-based read path.]]></description>
                <author><![CDATA[VulnWatch]]></author>
                <pubDate>Wed, 22 Apr 2026 18:00:07 +0000</pubDate>
                            </item>
                    <item>
                <title><![CDATA[CVE-2026-31504: In the Linux kernel, the following vulnerability has been resolved:

net: fix fanout UAF in packet_release() via NETDEV_]]></title>
                <link>https://nvd.nist.gov/vuln/detail/CVE-2026-31504</link>
                <description><![CDATA[In the Linux kernel, the following vulnerability has been resolved:

net: fix fanout UAF in packet_release() via NETDEV_UP race

`packet_release()` has a race window where `NETDEV_UP` can re-register a
socket into a fanout group's `arr[]` array. The re-registration is not
cleaned up by `fanout_release()`, leaving a dangling pointer in the fanout
array.
`packet_release()` does NOT zero `po->num` in its `bind_lock` section.
After releasing `bind_lock`, `po->num` is still non-zero and `po->ifindex`
still matches the bound device. A concurrent `packet_notifier(NETDEV_UP)`
that already found the socket in `sklist` can re-register the hook.
For fanout sockets, this re-registration calls `__fanout_link(sk, po)`
which adds the socket back into `f->arr[]` and increments `f->num_members`,
but does NOT increment `f->sk_ref`.

The fix sets `po->num` to zero in `packet_release` while `bind_lock` is
held to prevent NETDEV_UP from linking, preventing the race window.

This bug was found following an additional audit with Claude Code based
on CVE-2025-38617.]]></description>
                <author><![CDATA[VulnWatch]]></author>
                <pubDate>Wed, 22 Apr 2026 18:00:07 +0000</pubDate>
                            </item>
                    <item>
                <title><![CDATA[CVE-2026-31464: In the Linux kernel, the following vulnerability has been resolved:

scsi: ibmvfc: Fix OOB access in ibmvfc_discover_tar]]></title>
                <link>https://nvd.nist.gov/vuln/detail/CVE-2026-31464</link>
                <description><![CDATA[In the Linux kernel, the following vulnerability has been resolved:

scsi: ibmvfc: Fix OOB access in ibmvfc_discover_targets_done()

A malicious or compromised VIO server can return a num_written value in the
discover targets MAD response that exceeds max_targets. This value is
stored directly in vhost->num_targets without validation, and is then used
as the loop bound in ibmvfc_alloc_targets() to index into disc_buf[], which
is only allocated for max_targets entries. Indices at or beyond max_targets
access kernel memory outside the DMA-coherent allocation.  The
out-of-bounds data is subsequently embedded in Implicit Logout and PLOGI
MADs that are sent back to the VIO server, leaking kernel memory.

Fix by clamping num_written to max_targets before storing it.]]></description>
                <author><![CDATA[VulnWatch]]></author>
                <pubDate>Wed, 22 Apr 2026 18:00:07 +0000</pubDate>
                            </item>
                    <item>
                <title><![CDATA[CVE-2026-31436: In the Linux kernel, the following vulnerability has been resolved:

dmaengine: idxd: fix possible wrong descriptor comp]]></title>
                <link>https://nvd.nist.gov/vuln/detail/CVE-2026-31436</link>
                <description><![CDATA[In the Linux kernel, the following vulnerability has been resolved:

dmaengine: idxd: fix possible wrong descriptor completion in llist_abort_desc()

At the end of this function, d is the traversal cursor of flist, but the
code completes found instead. This can lead to issues such as NULL pointer
dereferences, double completion, or descriptor leaks.

Fix this by completing d instead of found in the final
list_for_each_entry_safe() loop.]]></description>
                <author><![CDATA[VulnWatch]]></author>
                <pubDate>Wed, 22 Apr 2026 18:00:07 +0000</pubDate>
                            </item>
                    <item>
                <title><![CDATA[Claude Mythos Finds 271 Firefox Vulnerabilities]]></title>
                <link>https://www.securityweek.com/claude-mythos-finds-271-firefox-vulnerabilities/</link>
                <description><![CDATA[All the flaws could have also been found by an elite human researcher, according to Mozilla.
The post Claude Mythos Finds 271 Firefox Vulnerabilities appeared first on SecurityWeek.]]></description>
                <author><![CDATA[VulnWatch]]></author>
                <pubDate>Wed, 22 Apr 2026 18:00:01 +0000</pubDate>
                            </item>
                    <item>
                <title><![CDATA[Toxic Combinations: When Cross-App Permissions Stack into Risk]]></title>
                <link>https://thehackernews.com/2026/04/toxic-combinations-when-cross-app.html</link>
                <description><![CDATA[On January 31, 2026, researchers disclosed that Moltbook, a social network built for AI agents, had left its database wide open, exposing 35,000 email addresses and 1.5 million agent API tokens across 770,000 active agents.
The more worrying part sat inside the private messages. Some of those conversations held plaintext third-party credentials, including OpenAI API keys shared between agents,]]></description>
                <author><![CDATA[VulnWatch]]></author>
                <pubDate>Wed, 22 Apr 2026 18:00:00 +0000</pubDate>
                            </item>
                    <item>
                <title><![CDATA[Cohere AI Terrarium Sandbox Flaw Enables Root Code Execution, Container Escape]]></title>
                <link>https://thehackernews.com/2026/04/cohere-ai-terrarium-sandbox-flaw.html</link>
                <description><![CDATA[A critical security vulnerability has been disclosed in a Python-based sandbox called Terrarium that could result in arbitrary code execution.
The vulnerability, tracked as CVE-2026-5752, is rated 9.3 on the CVSS scoring system.
"Sandbox escape vulnerability in Terrarium allows arbitrary code execution with root privileges on a host process via JavaScript prototype chain traversal," according to]]></description>
                <author><![CDATA[VulnWatch]]></author>
                <pubDate>Wed, 22 Apr 2026 18:00:00 +0000</pubDate>
                            </item>
                    <item>
                <title><![CDATA[CVE-2026-40933: Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, due to unsafe s]]></title>
                <link>https://nvd.nist.gov/vuln/detail/CVE-2026-40933</link>
                <description><![CDATA[Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, due to unsafe serialization of stdio commands in the MCP adapter, an authenticated attacker can add an MCP stdio server with an arbitrary command, achieving command execution. The vulnerability lies in a bug in the input sanitization from the “Custom MCP” configuration in http://localhost:3000/canvas - where any user can add a new MCP, when doing so - adding a new MCP using stdio, the user can add any command, even though your code have input sanitization checks such as validateCommandInjection and validateArgsForLocalFileAccess, and a list of predefined specific safe commands - these commands, for example "npx" can be combined with code execution arguments ("-c touch /tmp/pwn") that enable direct code execution on the underlying OS. This vulnerability is fixed in 3.1.0.]]></description>
                <author><![CDATA[VulnWatch]]></author>
                <pubDate>Wed, 22 Apr 2026 18:00:07 +0000</pubDate>
                            </item>
                    <item>
                <title><![CDATA[CVE-2026-22016: Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE]]></title>
                <link>https://nvd.nist.gov/vuln/detail/CVE-2026-22016</link>
                <description><![CDATA[Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JAXP).  Supported versions that are affected are Oracle Java SE: 8u481, 8u481-b50, 8u481-perf, 11.0.30, 17.0.18, 21.0.10, 25.0.2, 26; Oracle GraalVM for JDK: 17.0.18 and  21.0.10; Oracle GraalVM Enterprise Edition: 21.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition.  Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 7.5 (Confidentiality impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).]]></description>
                <author><![CDATA[VulnWatch]]></author>
                <pubDate>Wed, 22 Apr 2026 18:00:07 +0000</pubDate>
                            </item>
                    <item>
                <title><![CDATA[CVE-2026-40608: Next AI Draw.io is a next.js web application that integrates AI capabilities with draw.io diagrams. Prior to 0.4.15, the]]></title>
                <link>https://nvd.nist.gov/vuln/detail/CVE-2026-40608</link>
                <description><![CDATA[Next AI Draw.io is a next.js web application that integrates AI capabilities with draw.io diagrams. Prior to 0.4.15, the embedded HTTP sidecar contains three POST handlers (/api/state, /api/restore, and /api/history-svg) that process incoming requests by accumulating the entire request body into a JavaScript string without any size limitations. Node.js buffers the entire payload in the V8 heap. Sending a sufficiently large body (e.g., 500 MiB or more) will exhaust the process heap memory, leading to an Out-of-Memory (OOM) error that crashes the MCP server. This vulnerability is fixed in 0.4.15.]]></description>
                <author><![CDATA[VulnWatch]]></author>
                <pubDate>Wed, 22 Apr 2026 18:00:07 +0000</pubDate>
                            </item>
                    <item>
                <title><![CDATA[Google Patches Antigravity IDE Flaw Enabling Prompt Injection Code Execution]]></title>
                <link>https://thehackernews.com/2026/04/google-patches-antigravity-ide-flaw.html</link>
                <description><![CDATA[Cybersecurity researchers have discovered a vulnerability in Google's agentic integrated development environment (IDE), Antigravity, that could be exploited to achieve code execution.
The flaw, since patched, combines Antigravity's permitted file-creation capabilities with an insufficient input sanitization in Antigravity's native file-searching tool, find_by_name, to bypass the program's Strict]]></description>
                <author><![CDATA[VulnWatch]]></author>
                <pubDate>Wed, 22 Apr 2026 18:00:00 +0000</pubDate>
                            </item>
                    <item>
                <title><![CDATA[QIMMA قِمّة ⛰: A Quality-First Arabic LLM Leaderboard]]></title>
                <link>https://huggingface.co/blog/tiiuae/qimma-arabic-leaderboard</link>
                <description><![CDATA[]]></description>
                <author><![CDATA[VulnWatch]]></author>
                <pubDate>Wed, 22 Apr 2026 18:00:01 +0000</pubDate>
                            </item>
                    <item>
                <title><![CDATA[SGLang CVE-2026-5760 (CVSS 9.8) Enables RCE via Malicious GGUF Model Files]]></title>
                <link>https://thehackernews.com/2026/04/sglang-cve-2026-5760-cvss-98-enables.html</link>
                <description><![CDATA[A critical security vulnerability has been disclosed in SGLang that, if successfully exploited, could result in remote code execution on susceptible systems.
The vulnerability, tracked as CVE-2026-5760, carries a CVSS score of 9.8 out of 10.0. It has been described as a case of command injection leading to the execution of arbitrary code.
SGLang is a high-performance, open-source serving]]></description>
                <author><![CDATA[VulnWatch]]></author>
                <pubDate>Wed, 22 Apr 2026 18:00:00 +0000</pubDate>
                            </item>
                    <item>
                <title><![CDATA[Anthropic MCP Design Vulnerability Enables RCE, Threatening AI Supply Chain]]></title>
                <link>https://thehackernews.com/2026/04/anthropic-mcp-design-vulnerability.html</link>
                <description><![CDATA[Cybersecurity researchers have discovered a critical "by design" weakness in the Model Context Protocol's (MCP) architecture that could pave the way for remote code execution and have a cascading effect on the artificial intelligence (AI) supply chain.
"This flaw enables Arbitrary Command Execution (RCE) on any system running a vulnerable MCP implementation, granting attackers direct access to]]></description>
                <author><![CDATA[VulnWatch]]></author>
                <pubDate>Wed, 22 Apr 2026 18:00:00 +0000</pubDate>
                            </item>
                    <item>
                <title><![CDATA[[Webinar] Eliminate Ghost Identities Before They Expose Your Enterprise Data]]></title>
                <link>https://thehackernews.com/2026/04/webinar-find-and-eliminate-orphaned-non.html</link>
                <description><![CDATA[In 2024, compromised service accounts and forgotten API keys were behind 68% of cloud breaches. Not phishing. Not weak passwords. Unmanaged non-human identities that nobody was watching.
For every employee in your org, there are 40 to 50 automated credentials: service accounts, API tokens, AI agent connections, and OAuth grants. When projects end or employees leave, most]]></description>
                <author><![CDATA[VulnWatch]]></author>
                <pubDate>Wed, 22 Apr 2026 18:00:00 +0000</pubDate>
                            </item>
                    <item>
                <title><![CDATA[Training and Finetuning Multimodal Embedding &amp; Reranker Models with Sentence Transformers]]></title>
                <link>https://huggingface.co/blog/train-multimodal-sentence-transformers</link>
                <description><![CDATA[]]></description>
                <author><![CDATA[VulnWatch]]></author>
                <pubDate>Wed, 22 Apr 2026 18:00:01 +0000</pubDate>
                            </item>
                    <item>
                <title><![CDATA[Inside VAKRA: Reasoning, Tool Use, and Failure Modes of Agents]]></title>
                <link>https://huggingface.co/blog/ibm-research/vakra-benchmark-analysis</link>
                <description><![CDATA[]]></description>
                <author><![CDATA[VulnWatch]]></author>
                <pubDate>Wed, 22 Apr 2026 18:00:01 +0000</pubDate>
                            </item>
                    <item>
                <title><![CDATA[Deterministic + Agentic AI: The Architecture Exposure Validation Requires]]></title>
                <link>https://thehackernews.com/2026/04/deterministic-agentic-ai-architecture.html</link>
                <description><![CDATA[Few technologies have moved from experimentation to boardroom mandate as quickly as AI. Across industries, leadership teams have embraced its broader potential, and boards, investors, and executives are already pushing organizations to adopt it across operational and security functions. Pentera’s AI Security and Exposure Report 2026 reflects that momentum: every CISO surveyed]]></description>
                <author><![CDATA[VulnWatch]]></author>
                <pubDate>Wed, 22 Apr 2026 18:00:00 +0000</pubDate>
                            </item>
                    <item>
                <title><![CDATA[OpenAI Launches GPT-5.4-Cyber with Expanded Access for Security Teams]]></title>
                <link>https://thehackernews.com/2026/04/openai-launches-gpt-54-cyber-with.html</link>
                <description><![CDATA[OpenAI on Tuesday unveiled GPT-5.4-Cyber, a variant of its latest flagship model, GPT‑5.4, that's specifically optimized for defensive cybersecurity use cases, days after rival Anthropic unveiled its own frontier model, Mythos.
"The progressive use of AI accelerates defenders – those responsible for keeping systems, data, and users safe – enabling them to find and fix problems]]></description>
                <author><![CDATA[VulnWatch]]></author>
                <pubDate>Wed, 22 Apr 2026 18:00:00 +0000</pubDate>
                            </item>
                    <item>
                <title><![CDATA[Multimodal Embedding &amp; Reranker Models with Sentence Transformers]]></title>
                <link>https://huggingface.co/blog/multimodal-sentence-transformers</link>
                <description><![CDATA[]]></description>
                <author><![CDATA[VulnWatch]]></author>
                <pubDate>Wed, 22 Apr 2026 18:00:01 +0000</pubDate>
                            </item>
                    <item>
                <title><![CDATA[Safetensors is Joining the PyTorch Foundation]]></title>
                <link>https://huggingface.co/blog/safetensors-joins-pytorch-foundation</link>
                <description><![CDATA[]]></description>
                <author><![CDATA[VulnWatch]]></author>
                <pubDate>Wed, 22 Apr 2026 18:00:01 +0000</pubDate>
                            </item>
                    <item>
                <title><![CDATA[State of Open Source on Hugging Face: Spring 2026]]></title>
                <link>https://huggingface.co/blog/huggingface/state-of-os-hf-spring-2026</link>
                <description><![CDATA[]]></description>
                <author><![CDATA[VulnWatch]]></author>
                <pubDate>Wed, 22 Apr 2026 18:00:01 +0000</pubDate>
                            </item>
                    <item>
                <title><![CDATA[Introducing Storage Buckets on the Hugging Face Hub]]></title>
                <link>https://huggingface.co/blog/storage-buckets</link>
                <description><![CDATA[]]></description>
                <author><![CDATA[VulnWatch]]></author>
                <pubDate>Wed, 22 Apr 2026 18:00:01 +0000</pubDate>
                            </item>
                    <item>
                <title><![CDATA[Introducing Modular Diffusers - Composable Building Blocks for Diffusion Pipelines]]></title>
                <link>https://huggingface.co/blog/modular-diffusers</link>
                <description><![CDATA[]]></description>
                <author><![CDATA[VulnWatch]]></author>
                <pubDate>Wed, 22 Apr 2026 18:00:01 +0000</pubDate>
                            </item>
                    <item>
                <title><![CDATA[Mixture of Experts (MoEs) in Transformers]]></title>
                <link>https://huggingface.co/blog/moe-transformers</link>
                <description><![CDATA[]]></description>
                <author><![CDATA[VulnWatch]]></author>
                <pubDate>Wed, 22 Apr 2026 18:00:01 +0000</pubDate>
                            </item>
                    <item>
                <title><![CDATA[GGML and llama.cpp join HF to ensure the long-term progress of Local AI]]></title>
                <link>https://huggingface.co/blog/ggml-joins-hf</link>
                <description><![CDATA[]]></description>
                <author><![CDATA[VulnWatch]]></author>
                <pubDate>Wed, 22 Apr 2026 18:00:01 +0000</pubDate>
                            </item>
                    <item>
                <title><![CDATA[Train AI models with Unsloth and Hugging Face Jobs for FREE]]></title>
                <link>https://huggingface.co/blog/unsloth-jobs</link>
                <description><![CDATA[]]></description>
                <author><![CDATA[VulnWatch]]></author>
                <pubDate>Wed, 22 Apr 2026 18:00:01 +0000</pubDate>
                            </item>
                    <item>
                <title><![CDATA[Custom Kernels for All from Codex and Claude]]></title>
                <link>https://huggingface.co/blog/custom-cuda-kernels-agent-skills</link>
                <description><![CDATA[]]></description>
                <author><![CDATA[VulnWatch]]></author>
                <pubDate>Wed, 22 Apr 2026 18:00:01 +0000</pubDate>
                            </item>
                    <item>
                <title><![CDATA[Transformers.js v4: Now Available on NPM!]]></title>
                <link>https://huggingface.co/blog/transformersjs-v4</link>
                <description><![CDATA[]]></description>
                <author><![CDATA[VulnWatch]]></author>
                <pubDate>Wed, 22 Apr 2026 18:00:01 +0000</pubDate>
                            </item>
                    <item>
                <title><![CDATA[The Future of the Global Open-Source AI Ecosystem: From DeepSeek to AI+]]></title>
                <link>https://huggingface.co/blog/huggingface/one-year-since-the-deepseek-moment-blog-3</link>
                <description><![CDATA[]]></description>
                <author><![CDATA[VulnWatch]]></author>
                <pubDate>Wed, 22 Apr 2026 18:00:01 +0000</pubDate>
                            </item>
                    <item>
                <title><![CDATA[We Got Claude to Build CUDA Kernels and teach open models!]]></title>
                <link>https://huggingface.co/blog/upskill</link>
                <description><![CDATA[]]></description>
                <author><![CDATA[VulnWatch]]></author>
                <pubDate>Wed, 22 Apr 2026 18:00:01 +0000</pubDate>
                            </item>
                    <item>
                <title><![CDATA[Architectural Choices in China's Open-Source AI Ecosystem: Building Beyond DeepSeek ]]></title>
                <link>https://huggingface.co/blog/huggingface/one-year-since-the-deepseek-moment-blog-2</link>
                <description><![CDATA[]]></description>
                <author><![CDATA[VulnWatch]]></author>
                <pubDate>Wed, 22 Apr 2026 18:00:01 +0000</pubDate>
                            </item>
                    <item>
                <title><![CDATA[Alyah ⭐️: Toward Robust Evaluation of Emirati Dialect Capabilities in Arabic LLMs]]></title>
                <link>https://huggingface.co/blog/tiiuae/emirati-benchmarks</link>
                <description><![CDATA[]]></description>
                <author><![CDATA[VulnWatch]]></author>
                <pubDate>Wed, 22 Apr 2026 18:00:01 +0000</pubDate>
                            </item>
                    <item>
                <title><![CDATA[Unlocking Agentic RL Training for GPT-OSS: A Practical Retrospective]]></title>
                <link>https://huggingface.co/blog/LinkedIn/gpt-oss-agentic-rl</link>
                <description><![CDATA[]]></description>
                <author><![CDATA[VulnWatch]]></author>
                <pubDate>Wed, 22 Apr 2026 18:00:01 +0000</pubDate>
                            </item>
                    <item>
                <title><![CDATA[AssetOpsBench: Bridging the Gap Between AI Agent Benchmarks and Industrial Reality]]></title>
                <link>https://huggingface.co/blog/ibm-research/assetopsbench-playground-on-hugging-face</link>
                <description><![CDATA[]]></description>
                <author><![CDATA[VulnWatch]]></author>
                <pubDate>Wed, 22 Apr 2026 18:00:01 +0000</pubDate>
                            </item>
                    <item>
                <title><![CDATA[One Year Since the “DeepSeek Moment”]]></title>
                <link>https://huggingface.co/blog/huggingface/one-year-since-the-deepseek-moment</link>
                <description><![CDATA[]]></description>
                <author><![CDATA[VulnWatch]]></author>
                <pubDate>Wed, 22 Apr 2026 18:00:01 +0000</pubDate>
                            </item>
            </channel>
</rss>
