{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2025:JHDHT2OXT7NW4XOEEDC75PLFLR","short_pith_number":"pith:JHDHT2OX","canonical_record":{"source":{"id":"2508.21457","kind":"arxiv","version":3},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2025-08-29T09:39:46Z","cross_cats_sorted":[],"title_canon_sha256":"a6e92dd911a451c7ff7314bde60d76ecf2f9cd50aaeadc7b60f59e2f624aa66f","abstract_canon_sha256":"fc9b634498cacc0bb0fc0941c420385e8b64bc2eb36e5c74e5d69b790da5e202"},"schema_version":"1.0"},"canonical_sha256":"49c679e9d79fdb6e5dc420c5febd655c40099b32f9086e592c9b5b35ff378bd9","source":{"kind":"arxiv","id":"2508.21457","version":3},"source_aliases":[{"alias_kind":"arxiv","alias_value":"2508.21457","created_at":"2026-05-18T03:09:34Z"},{"alias_kind":"arxiv_version","alias_value":"2508.21457v3","created_at":"2026-05-18T03:09:34Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.2508.21457","created_at":"2026-05-18T03:09:34Z"},{"alias_kind":"pith_short_12","alias_value":"JHDHT2OXT7NW","created_at":"2026-05-18T12:33:37Z"},{"alias_kind":"pith_short_16","alias_value":"JHDHT2OXT7NW4XOE","created_at":"2026-05-18T12:33:37Z"},{"alias_kind":"pith_short_8","alias_value":"JHDHT2OX","created_at":"2026-05-18T12:33:37Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2025:JHDHT2OXT7NW4XOEEDC75PLFLR","target":"record","payload":{"canonical_record":{"source":{"id":"2508.21457","kind":"arxiv","version":3},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2025-08-29T09:39:46Z","cross_cats_sorted":[],"title_canon_sha256":"a6e92dd911a451c7ff7314bde60d76ecf2f9cd50aaeadc7b60f59e2f624aa66f","abstract_canon_sha256":"fc9b634498cacc0bb0fc0941c420385e8b64bc2eb36e5c74e5d69b790da5e202"},"schema_version":"1.0"},"canonical_sha256":"49c679e9d79fdb6e5dc420c5febd655c40099b32f9086e592c9b5b35ff378bd9","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T03:09:34.800510Z","signature_b64":"0wjNcJ88jcFKLgYtWyjtOB0mHHQnwcm68lpCuBnehPiYxoUlKeGJXnI2Dz5DDq6UqygpHC4oB5153H627m3xCg==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"49c679e9d79fdb6e5dc420c5febd655c40099b32f9086e592c9b5b35ff378bd9","last_reissued_at":"2026-05-18T03:09:34.799926Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T03:09:34.799926Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"2508.21457","source_version":3,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T03:09:34Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"1QJsq/dEs4mJnP1UyUMp3EXnzo6JRcuV747iPjiIgGjhY5p19LjKuixi5lMPy+u04Cwavt2PVefr/7AFOM2+Aw==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-21T08:08:55.291979Z"},"content_sha256":"4305fda3309ed8680da256444d4b5a933c103bf6c7f78fb8bd16911d434221ee","schema_version":"1.0","event_id":"sha256:4305fda3309ed8680da256444d4b5a933c103bf6c7f78fb8bd16911d434221ee"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2025:JHDHT2OXT7NW4XOEEDC75PLFLR","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"SoK: Exposing the Generation and Detection Gaps in LLM-Generated Phishing","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"cs.CR","authors_text":"Carsten Rudolph, Fengchao Chen, Tingmin Wu, Van Nguyen","submitted_at":"2025-08-29T09:39:46Z","abstract_excerpt":"Phishing campaigns involve adversaries masquerading as trusted vendors trying to trigger user behavior that enables them to exfiltrate private data. While URLs are an important part of phishing campaigns, communicative elements like text and images are central in triggering the required user behavior. Further, due to advances in phishing detection, attackers react by scaling campaigns to larger numbers and diversifying and personalizing content. In addition to established mechanisms, such as template-based generation, large language models (LLMs) can be used for phishing content generation, en"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"2508.21457","kind":"arxiv","version":3},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T03:09:34Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"N8xEWRrqTBhn9HF3NCIKto0gj3zOswQU7ivzl8GD/CizCTneFaaxNYa0yKS+QwI+sWoXfsP0CWFnuEpn5iz7BA==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-21T08:08:55.292339Z"},"content_sha256":"c0c46b2c606f7326e52450f2a607d525455f9d4487226bfd57c84f2d62c6280c","schema_version":"1.0","event_id":"sha256:c0c46b2c606f7326e52450f2a607d525455f9d4487226bfd57c84f2d62c6280c"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/JHDHT2OXT7NW4XOEEDC75PLFLR/bundle.json","state_url":"https://pith.science/pith/JHDHT2OXT7NW4XOEEDC75PLFLR/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/JHDHT2OXT7NW4XOEEDC75PLFLR/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-21T08:08:55Z","links":{"resolver":"https://pith.science/pith/JHDHT2OXT7NW4XOEEDC75PLFLR","bundle":"https://pith.science/pith/JHDHT2OXT7NW4XOEEDC75PLFLR/bundle.json","state":"https://pith.science/pith/JHDHT2OXT7NW4XOEEDC75PLFLR/state.json","well_known_bundle":"https://pith.science/.well-known/pith/JHDHT2OXT7NW4XOEEDC75PLFLR/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2025:JHDHT2OXT7NW4XOEEDC75PLFLR","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"fc9b634498cacc0bb0fc0941c420385e8b64bc2eb36e5c74e5d69b790da5e202","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2025-08-29T09:39:46Z","title_canon_sha256":"a6e92dd911a451c7ff7314bde60d76ecf2f9cd50aaeadc7b60f59e2f624aa66f"},"schema_version":"1.0","source":{"id":"2508.21457","kind":"arxiv","version":3}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"2508.21457","created_at":"2026-05-18T03:09:34Z"},{"alias_kind":"arxiv_version","alias_value":"2508.21457v3","created_at":"2026-05-18T03:09:34Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.2508.21457","created_at":"2026-05-18T03:09:34Z"},{"alias_kind":"pith_short_12","alias_value":"JHDHT2OXT7NW","created_at":"2026-05-18T12:33:37Z"},{"alias_kind":"pith_short_16","alias_value":"JHDHT2OXT7NW4XOE","created_at":"2026-05-18T12:33:37Z"},{"alias_kind":"pith_short_8","alias_value":"JHDHT2OX","created_at":"2026-05-18T12:33:37Z"}],"graph_snapshots":[{"event_id":"sha256:c0c46b2c606f7326e52450f2a607d525455f9d4487226bfd57c84f2d62c6280c","target":"graph","created_at":"2026-05-18T03:09:34Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"Phishing campaigns involve adversaries masquerading as trusted vendors trying to trigger user behavior that enables them to exfiltrate private data. While URLs are an important part of phishing campaigns, communicative elements like text and images are central in triggering the required user behavior. Further, due to advances in phishing detection, attackers react by scaling campaigns to larger numbers and diversifying and personalizing content. In addition to established mechanisms, such as template-based generation, large language models (LLMs) can be used for phishing content generation, en","authors_text":"Carsten Rudolph, Fengchao Chen, Tingmin Wu, Van Nguyen","cross_cats":[],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2025-08-29T09:39:46Z","title":"SoK: Exposing the Generation and Detection Gaps in LLM-Generated Phishing"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"2508.21457","kind":"arxiv","version":3},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:4305fda3309ed8680da256444d4b5a933c103bf6c7f78fb8bd16911d434221ee","target":"record","created_at":"2026-05-18T03:09:34Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"fc9b634498cacc0bb0fc0941c420385e8b64bc2eb36e5c74e5d69b790da5e202","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2025-08-29T09:39:46Z","title_canon_sha256":"a6e92dd911a451c7ff7314bde60d76ecf2f9cd50aaeadc7b60f59e2f624aa66f"},"schema_version":"1.0","source":{"id":"2508.21457","kind":"arxiv","version":3}},"canonical_sha256":"49c679e9d79fdb6e5dc420c5febd655c40099b32f9086e592c9b5b35ff378bd9","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"49c679e9d79fdb6e5dc420c5febd655c40099b32f9086e592c9b5b35ff378bd9","first_computed_at":"2026-05-18T03:09:34.799926Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T03:09:34.799926Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"0wjNcJ88jcFKLgYtWyjtOB0mHHQnwcm68lpCuBnehPiYxoUlKeGJXnI2Dz5DDq6UqygpHC4oB5153H627m3xCg==","signature_status":"signed_v1","signed_at":"2026-05-18T03:09:34.800510Z","signed_message":"canonical_sha256_bytes"},"source_id":"2508.21457","source_kind":"arxiv","source_version":3}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:4305fda3309ed8680da256444d4b5a933c103bf6c7f78fb8bd16911d434221ee","sha256:c0c46b2c606f7326e52450f2a607d525455f9d4487226bfd57c84f2d62c6280c"],"state_sha256":"0cad70b6e917e78e4e340f88ffb74d4ca0c0fac57321ba2dfe6f1697ca75d80a"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"pZv5I3HcKf6oEUNL98Dan3C3dxbYRyKco8JSBcmWGkND7D+4oGoPtPVyq3ygyrFWKrKz5J5QvuuG63pFo/vPAA==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-21T08:08:55.294295Z","bundle_sha256":"1eebbea1b2f90578ad7b55f2a93b3b1ff99edaabf372bc42c09997b5a038d286"}}