BACK_TO_FEEDAICRIER_2
Tool dumps weights from TensorRT engines
OPEN_SOURCE ↗
REDDIT · REDDIT// 6d agoOPENSOURCE RELEASE

Tool dumps weights from TensorRT engines

trt-weight-extractor recovers raw model parameters from compiled NVIDIA TensorRT engines by leveraging the IRefitter API and binary diffing. A critical utility for evaluating the "security through obscurity" of local AI deployments.

// ANALYSIS

Released by AI DRM startup RefortifAI, this tool proves that compiled engines are not a safe vault for intellectual property if the REFIT flag is enabled.

  • Uses a "refit-diff mapping" technique to identify exact file offsets for weights without needing the original model architecture or ONNX files.
  • Exports recovered weights to standard .safetensors or .npy formats, allowing models to be ported back to frameworks like PyTorch.
  • Highlights a major vulnerability in edge AI deployments where compiled .engine files are often incorrectly assumed to be obfuscated.
  • Restricted to engines built with BuilderFlag.REFIT, though this flag is commonly used for post-training quantization and runtime weight updates.
  • Serves as a "proof of concept" for why hardened runtimes are necessary for protecting proprietary weights in untrusted environments.
// TAGS
trt-weight-extractortensorrtsecurityinferenceopen-sourcellmsafety

DISCOVERED

6d ago

2026-04-06

PUBLISHED

6d ago

2026-04-05

RELEVANCE

8/ 10

AUTHOR

The-flying-statsman