Platform
SOLUTIONS
Runtime Vulnerability Management
Cloud Application Detection & Response
Use Cases
Why Oligo
Application Vulnerability Management
Attack Detection and Response
Workload Protection
AI Security
Supply Chain Security
Real-Time BOM/VEX
Compliance and Assurance
Resources
Resources
Resource Center
Blog
Events
Webinars
appsec academy
Application Security
Software Supply
Chain Security
Open Source Security
featured Blog
Airborne: Wormable Zero-Click Remote Code Execution (RCE) in AirPlay Protocol Puts Apple & IoT Devices at Risk
Read More
Customers
customers
All stories
Mural
OneTrust
Cresta
Sage
OpenWeb
featured customer
Sage Deploys Oligo to Cut Vulnerability Backlogs 90% In <1 Hour
Read More
Company
company
About Oligo
Newsroom
Partners
Contact us
Careers
featured news
Oligo Security Raises $50M Series B to Redefine Security for Modern Applications
Read More
menu
Solutions
Resources
Customers
Company
Back
Platform
Runtime Vulnerability
Management
Cloud Application
Detection & Response
Use Cases
Why Oligo
Application Vulnerability
Management
Attack Detection and Response
Workload Protection
AI Security
Supply Chain Security
Real-Time BOM/VEX
Compliance and Assurance
Back
Resources
Resource Center
Blog
Events
Webinars
appsec academy
Application Security
Software Supply
Chain Security
Open Source Security
featured Blog
Airborne: Wormable Zero-Click Remote Code Execution (RCE) in AirPlay Protocol Puts Apple & IoT Devices at Risk
Read More
Back
customers
All stories
Mural
OneTrust
Cresta
Sage
OpenWeb
featured customer
Sage Deploys Oligo to Cut Vulnerability Backlogs 90% In <1 Hour
Read More
Back
company
About Oligo
Newsroom
Contact us
Careers
featured news
Oligo Security Raises $50M Series B to Redefine Security for Modern Applications
Read More
Book a Demo

Avi Lumelsky

Avi Lumelsky is a security researcher specializing in engineering and AI. At Oligo Security, he secures AI infrastructure by uncovering vulnerabilities in open-source projects. Previously at Deci AI (now part of NVIDIA), he focused on model optimization. His work has resulted in reports for major companies like Google and Meta, and has been featured in Forbes and Hacker News. He also maintains open-source eBPF projects and explores vulnerabilities in AI frameworks and inference servers.

More Articles by
Avi Lumelsky

Research

Airborne: Wormable Zero-Click Remote Code Execution (RCE) in AirPlay Protocol Puts Apple & IoT Devices at Risk

Read more
Security

CVE Funding Almost Expired: What You Need to Know

Read more
Product

Uncovering the Hidden Risks: How Oligo Identifies 1100% More Vulnerable Functions

Read more
Research
Shadow Vulnerability

Shadow Vulnerabilities in AI: The Hidden Perils Beyond CVEs

Read more
Research
Security

Critical Vulnerabilities in AirPlay Protocol Affecting Multiple Apple Devices

Read more
Research
Shadow Vulnerability

CVE-2024-50050: Critical Vulnerability in meta-llama/llama-stack

Read more
Research

More Models, More ProbLLMs

Read more
Research

New Remote Code Execution (RCE) Vulnerabilities in CUPS for Linux: Threats and Mitigations

Read more
Research
Shadow Vulnerability

Shining a Light on Shadow Vulnerabilities

Read more
Research
Shadow Vulnerability

TensorFlow Keras Downgrade Attack: CVE-2024-3660 Bypass

Read more
Research
Shadow Vulnerability

0.0.0.0 Day: Exploiting Localhost APIs From the Browser

Read more
Research
Shadow Vulnerability

Shelltorch Explained: Multiple Vulnerabilities in Pytorch Model Server (Torchserve) (CVSS 9.9, CVSS 9.8) Walkthrough

Read more
Security

App-Level eBPF Applications - User vs. Kernel Probes

Read more
Research
Shadow Vulnerability

ShadowRay: First Known Attack Campaign Targeting AI Workloads Actively Exploited In The Wild

Read more
all
Open Source Security
open-source-security

What Is an SBOM? Types, Components, Formats, and Tips [2025 Guide]

Read more
all
Application Security
application-security

10 Snyk Alternatives to Consider in 2025

Read more
all
Open Source Security
open-source-security

5 SBOM Generation Tools & 5 Critical Best Practices

Read more
all
Application Security Vulnerabilities
application-security-vulnerabilities

Breaking Down OWASP Top 10 for Web Apps, Mobile, API, K8s and LLMs

Read more
all
Application Security Vulnerabilities
application-security-vulnerabilities

OWASP Top 10 LLM, Updated 2025: Examples and Mitigation Strategies

Read more
all
Application Security
application-security

Runtime Security: Key Components, Technologies and Best Practices

Read more
No items found.
COMPANY
HomeAboutContactCustomersCareersPartners
SOLUTIONS
Runtime Vulnerability ManagementCloud Application Detection & Response
Use Cases
Application Vulnerability ManagementAttack Detection and ResponseWorkload ProtectionAI SecuritySupply Chain SecurityReal-Time BOM/VEXCompliance and Assurance
RESOURCES
Resource CenterBlogNewsEventsAcademyWhitepapersApplication Detection & ResponseReachability Analysis
Copyright © Oligo Security| All Rights Reserved 2025
Terms of usePrivacy PolicyCookie Policy
AICPA SOCISO