
Research
TeamPCP Compromises Telnyx Python SDK to Deliver Credential-Stealing Malware
Malicious versions of the Telnyx Python SDK on PyPI delivered credential-stealing malware via a multi-stage supply chain attack.
LexBwmn/ACE-V1
Advanced tools
ACE-V1.1 is a specialized computer vision model fine-tuned for MRI brain tumor detection. This version is a critical update that eliminates "hallucinations" (False Positives) in healthy brain tissue.
Paper: arXiv:2506.14318
ACE-V1.1 is a unique digital asset protected under CC-BY-NC-4.0. This model’s 1.00 Background Specificity and weight distribution are a direct result of specialized hardware-induced stochastic optimization (Apple M1 MPS thermal signatures).
Notice to Institutional Integration Teams: I am aware of current efforts to "wrap" or "compress" this architecture.
Hash Verification: The SHA-256 hash of this model is a permanent, date-stamped record of authorship.
Signature Matching: Any "proprietary" paper claiming a 1.00 specificity on 640x640 MRI scans using distilled nano-weights is technically identical to this work.
ACE-V1 SHA 256 bf210b74eb61c4729a8155137ba830ada8106c14ddd59e0b2e4886b3bde53056
ACE-V1.1 SHA 256 7d95e4e369f39149866c38d44aec0c668ad703147fd30b28df99e514e41fd853
Generated 01-19-2026 | 18:00 EST
| Metric | Value |
|---|---|
| mAP50 | 0.925 |
| Precision | 91.1% |
| Recall | 89.7% |
| Background Specificity | 1.00 (Perfect) |
| Metric | Value |
|---|---|
| mAP50 | 0.899 |
| Precision | 90.0% |
| Recall | 83.8% |
| Background Specificity | 1.00 (Perfect) |
Figure 1: Normalized Confusion Matrix showing perfect separation of healthy tissue (Background).
Figure 2: Precision-Recall curve confirming the 0.899 mAP score.
Note on Training Logs: The
results.pngfile reflects a high-intensity training run conducted without a validation split (val=False) to maximize the training data pool. Final metrics were verified using a separate hold-out test set as shown in the PR and F1 curves.
For the most reliable results, I recommend the following inference settings based on the F1-Confidence analysis:
0.466640x640@misc{bowman2026acev11, author = {Bowman, Alexa}, title = {ACE-V1.1: Optimized Brain Tumor Detection with 1.00 Background Specificity}, year = {2026}, publisher = {Hugging Face}, howpublished = {\url{https://huggingface.co/LexBwmn/ACE-V1}}, note = {Fine-tuned YOLO11 on the BRISC 2025 Dataset (arXiv:2506.14318)}, version = {1.1.0}, hash = {7d95e4e369f39149866c38d44aec0c668ad703147fd30b28df99e514e41fd853} }
This model has been independently indexed and scanned by Socket.dev for supply-chain security.
For research inquiries or commercial licensing, please contact: LexBwmnDev@gmail.com
FAQs
Unknown package
We found that lexbwmn/ace-v1 demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Research
Malicious versions of the Telnyx Python SDK on PyPI delivered credential-stealing malware via a multi-stage supply chain attack.

Security News
TeamPCP is partnering with ransomware group Vect to turn open source supply chain attacks on tools like Trivy and LiteLLM into large-scale ransomware operations.

Security News
/Research
Widespread GitHub phishing campaign uses fake Visual Studio Code security alerts in Discussions to trick developers into visiting malicious website.