
Hail to the Thief: Exploring Attacks and Defenses in Decentralised GRPO
Backdoors via Strings: How Decentralized GRPO Gets Poisoned—and Practical Checks to Stop It

Hail to the Thief: Exploring Attacks and Defenses in Decentralised GRPO
Backdoors via Strings: How Decentralized GRPO Gets Poisoned—and Practical Checks to Stop It