You need to agree to share your contact information to access this model

This repository is publicly accessible, but you have to accept the conditions to access its files and content.

Log in or Sign Up to review the conditions and access this model content.

ModelScan Bypass PoC โ€” http.server.HTTPServer

Security research for responsible disclosure via Huntr MFV program.

Vulnerability

http.server.HTTPServer is not in modelscan's unsafe_globals blocklist. modelscan reports "No issues found" but loading triggers starts an HTTP server on deserialization โ€” serves ALL local files to the network.

Impact: CRITICAL

http is not in the blocklist (only httplib is). HTTPServer constructor binds to a port and socket is used internally but the constructor is via http.server, not socket directly.

Reproduction

pip install modelscan
modelscan scan -p bypass_poc.pkl
# Output: "No issues found!"
Downloads last month

-

Downloads are not tracked for this model. How to track
Inference Providers NEW
This model isn't deployed by any Inference Provider. ๐Ÿ™‹ Ask for provider support