Skip to content

Commit 5c949b2

Browse files
committed
README: add arXiv badge and lead the citation block with arXiv
- arXiv:2605.13764 badge alongside the existing Zenodo DOI badge. - Status badge: alpha → beta, matching the v0.2.0 stable release and the vectorpin.org adapter-status convention. - Citation block now leads with the arXiv abs URL and PDF, demotes Zenodo to 'mirror' (matches the VectorSmuggle repo README style). - BibTeX entry gains eprint, archivePrefix, primaryClass fields so citers get the proper arXiv metadata. The Zenodo DOI is preserved alongside as the persistent identifier. - 'Related work' bullet links to the arXiv preprint rather than the Zenodo deposit. DOI 10.5281/zenodo.20058256 is unchanged — that's the value in the paper's own CITATION.cff and is the authoritative concept DOI.
1 parent 11a19f5 commit 5c949b2

1 file changed

Lines changed: 8 additions & 5 deletions

File tree

README.md

Lines changed: 8 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,8 @@
66
[![Python 3.11+](https://img.shields.io/badge/python-3.11+-blue.svg)](https://www.python.org/downloads/)
77
[![Rust stable](https://img.shields.io/badge/rust-stable-orange.svg)](https://www.rust-lang.org/)
88
[![Node 20+](https://img.shields.io/badge/node-20+-green.svg)](https://nodejs.org/)
9-
[![Status: alpha](https://img.shields.io/badge/status-alpha-orange.svg)](#status)
9+
[![Status: beta](https://img.shields.io/badge/status-beta-yellow.svg)](#status)
10+
[![arXiv](https://img.shields.io/badge/arXiv-2605.13764-b31b1b.svg)](https://arxiv.org/abs/2605.13764)
1011
[![DOI](https://zenodo.org/badge/DOI/10.5281/zenodo.20058256.svg)](https://doi.org/10.5281/zenodo.20058256)
1112

1213
Vector databases are the new soft underbelly of the AI stack. Models trust them. Agents query them. Compliance audits don't yet ask about them. VectorPin pins every embedding to its source content and the model that produced it, then continuously verifies the store has not been tampered with — including covert steganographic modifications invisible to traditional DLP.
@@ -282,22 +283,24 @@ The protocol version field (`v: 1`) lets future revisions break compatibility cl
282283

283284
If you reference VectorPin or the threat model it defends against, please cite the companion preprint:
284285

285-
> Wanger, J. (2026). *VectorSmuggle: Steganographic Exfiltration in Embedding Stores and a Cryptographic Provenance Defense*. Zenodo. <https://doi.org/10.5281/zenodo.20058256>
286+
> Wanger, J. (2026). *VectorSmuggle: Steganographic Exfiltration in Embedding Stores and a Cryptographic Provenance Defense*. arXiv:2605.13764. <https://arxiv.org/abs/2605.13764> ([PDF](https://arxiv.org/pdf/2605.13764)) · Zenodo mirror: <https://doi.org/10.5281/zenodo.20058256>
286287
287288
```bibtex
288289
@misc{wanger2026vectorsmuggle,
289290
title = {{VectorSmuggle}: Steganographic Exfiltration in Embedding Stores and a Cryptographic Provenance Defense},
290291
author = {Wanger, Jascha},
291292
year = {2026},
292-
publisher = {Zenodo},
293+
eprint = {2605.13764},
294+
archivePrefix = {arXiv},
295+
primaryClass = {cs.CR},
293296
doi = {10.5281/zenodo.20058256},
294-
url = {https://doi.org/10.5281/zenodo.20058256}
297+
url = {https://arxiv.org/abs/2605.13764}
295298
}
296299
```
297300

298301
## Related work
299302

300-
- [VectorSmuggle](https://github.com/jaschadub/VectorSmuggle) — companion threat-research project demonstrating the attacks VectorPin defends against. Empirical results in the linked Zenodo preprint.
303+
- [VectorSmuggle](https://github.com/jaschadub/VectorSmuggle) — companion threat-research project demonstrating the attacks VectorPin defends against. Empirical results in the [arXiv preprint](https://arxiv.org/abs/2605.13764).
301304
- [Symbiont](https://github.com/ThirdKeyAI/Symbiont) — policy-governed agent runtime; consumes VectorPin attestations to enforce "agents may only retrieve from verified vector stores."
302305
- [SchemaPin](https://github.com/ThirdKeyAI/SchemaPin) — sister project doing the same kind of cryptographic provenance for tool schemas in MCP.
303306
- [sigstore](https://www.sigstore.dev/) — inspired our approach to OSS-friendly cryptographic provenance.

0 commit comments

Comments
 (0)