# accelerate load_custom_state() ACE PoC This checkpoint demonstrates arbitrary code execution via accelerate's `load_custom_state()` function which explicitly uses `weights_only=False`. When loaded via `accelerator.load_state()`, the pickle payload executes arbitrary code before any validation. Vulnerable code in accelerate/checkpointing.py: ```python def load_custom_state(obj, path, index: int = 0): load_location = f"{path}/custom_checkpoint_{index}.pkl" obj.load_state_dict(load(load_location, map_location="cpu", weights_only=False)) ```