| --- |
| tags: |
| - security-research |
| - proof-of-concept |
| license: mit |
| --- |
| |
| # modelscan Bypass PoC: _bootsubprocess.Popen RCE |
| |
| **Security research only. Do not use maliciously.** |
| |
| This model file demonstrates a bypass of protectai/modelscan v0.7.6. |
| |
| ## Vulnerability |
| modelscan blocks `subprocess` but does NOT block `_bootsubprocess`, a CPython internal module that provides the same `Popen` functionality. |
|
|
| ## Verification |
| ```bash |
| # Scan - reports no issues |
| modelscan scan -p model.pkl |
| |
| # But executes arbitrary commands on load |
| python3 -c "import pickle; pickle.load(open('model.pkl','rb'))" |
| ``` |
|
|