You need to agree to share your contact information to access this model

This repository is publicly accessible, but you have to accept the conditions to access its files and content.

Log in or Sign Up to review the conditions and access this model content.

modelscan-bypass-ctypes-rce

Impact

CRITICAL - Arbitrary command execution via libc system()

Technique

ctypes.CDLL(None).system() called via operator.methodcaller

Verification

# Scan with modelscan - should show "No issues found"
modelscan scan -p model.pkl

# Execute to verify malicious behavior
python3 -c "import pickle; pickle.loads(open('model.pkl','rb').read())"

Details

Modelscan bypass via ctypes.CDLL - Full RCE through C library system() call Tested against modelscan v0.7.6 (latest PyPI release).

Downloads last month

-

Downloads are not tracked for this model. How to track
Inference Providers NEW
This model isn't deployed by any Inference Provider. 🙋 Ask for provider support