modelscan-bypass-pipes-template
Security research: demonstrates modelscan bypass via pipes.Template shell command execution.
Vulnerability
pipes.Template is not in modelscan's unsafe_globals blocklist. Combined with operator.methodcaller (also unblocked), this achieves arbitrary shell command execution that passes modelscan with "No issues found".
Chain
- pipes.Template() โ template object
- template.append(CMD, "--") โ mutates template with shell command
- template.open("/dev/null", "r") โ EXECUTES the command pipeline
Affected
- modelscan 0.7.6 (latest PyPI)
- modelscan GitHub main
Remediation
Add "pipes": "*" to unsafe_globals in settings.py.
Inference Providers NEW
This model isn't deployed by any Inference Provider. ๐ Ask for provider support