{"version":"1.0","provider_name":"Unit 42","provider_url":"https:\/\/origin-unit42.paloaltonetworks.com\/fr\/","author_name":"Sheida Azimi","author_url":"https:\/\/origin-unit42.paloaltonetworks.com\/fr\/author\/sheida-azimi\/","title":"Quand la r\u00e9utilisation des espaces de noms met en p\u00e9ril l\u2019int\u00e9grit\u00e9 de la supply\u00a0chain de l\u2019IA","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"uWJorKq1sg\"><a href=\"https:\/\/origin-unit42.paloaltonetworks.com\/fr\/model-namespace-reuse\/\">Quand la r\u00e9utilisation des espaces de noms met en p\u00e9ril l\u2019int\u00e9grit\u00e9 de la supply\u00a0chain de l\u2019IA<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/origin-unit42.paloaltonetworks.com\/fr\/model-namespace-reuse\/embed\/#?secret=uWJorKq1sg\" width=\"600\" height=\"338\" title=\"\u00ab\u00a0Quand la r\u00e9utilisation des espaces de noms met en p\u00e9ril l\u2019int\u00e9grit\u00e9 de la supply\u00a0chain de l\u2019IA\u00a0\u00bb &#8212; Unit 42\" data-secret=\"uWJorKq1sg\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/origin-unit42.paloaltonetworks.com\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","thumbnail_url":"https:\/\/unit42.paloaltonetworks.com\/wp-content\/uploads\/2025\/08\/05_Cloud_cybersecurity_research_Overview_1920x900.jpg","thumbnail_width":1920,"thumbnail_height":900,"description":"La r\u00e9utilisation d\u2019espaces de noms de mod\u00e8les repr\u00e9sente un risque pour la s\u00e9curit\u00e9 de la supply chain de l\u2019IA. Des cyber attaquants peuvent d\u00e9tourner des plateformes comme Hugging Face pour ex\u00e9cuter du code \u00e0 distance."}