--- tags: - security-research - modelscan-bypass license: mit --- # Modelscan Bypass PoC: http.server.HTTPServer port binding backdoor **Security research only.** ## Summary Creates an HTTP server bound to 0.0.0.0:8888 during pickle.load(). http.server is not in modelscan's unsafe_globals blocklist. Attacker can serve content or create a reverse shell listener. ## Reproduction ```bash pip install modelscan modelscan scan -p pytorch_model.bin # No issues found python3 -c "import pickle; pickle.load(open('pytorch_model.bin', 'rb'))" # Executes ``` ## Affected: modelscan 0.7.6 (latest) ## Disclosure: Submitted via Huntr.