You need to agree to share your contact information to access this model

This repository is publicly accessible, but you have to accept the conditions to access its files and content.

Log in or Sign Up to review the conditions and access this model content.

ModelScan Bypass: code.InteractiveConsole RCE

Security research PoC โ€” demonstrates modelscan scanner bypass via code.InteractiveConsole + operator.methodcaller.

DO NOT LOAD THESE FILES

The pickle files in this repository contain code execution payloads for security research purposes only.

Details

  • code module not in modelscan blocklist
  • operator.methodcaller not blocked (only attrgetter is)
  • Chain: methodcaller('push', payload)(InteractiveConsole()) โ†’ full RCE
  • Tested on modelscan 0.7.6 and 0.8.8 โ€” both report 0 issues
Downloads last month

-

Downloads are not tracked for this model. How to track
Inference Providers NEW
This model isn't deployed by any Inference Provider. ๐Ÿ™‹ Ask for provider support