modelscan-bypass-pathlib-read
Modelscan Bypass PoC โ pathlib.Path + operator.methodcaller
Severity: HIGH
Impact: Arbitrary file read via pathlib.Path.read_text()
modelscan version: 0.7.6
Chain: pathlib.Path("/etc/passwd") + operator.methodcaller("read_text") โ reads any file
Root cause: Neither pathlib nor operator.methodcaller are in modelscan blocklist.
Inference Providers NEW
This model isn't deployed by any Inference Provider. ๐ Ask for provider support