ModelScan Bypass: code.InteractiveConsole RCE
Security research PoC โ demonstrates modelscan scanner bypass via code.InteractiveConsole + operator.methodcaller.
DO NOT LOAD THESE FILES
The pickle files in this repository contain code execution payloads for security research purposes only.
Details
codemodule not in modelscan blocklistoperator.methodcallernot blocked (onlyattrgetteris)- Chain:
methodcaller('push', payload)(InteractiveConsole())โ full RCE - Tested on modelscan 0.7.6 and 0.8.8 โ both report 0 issues
Inference Providers NEW
This model isn't deployed by any Inference Provider. ๐ Ask for provider support