You need to agree to share your contact information to access this model

This repository is publicly accessible, but you have to accept the conditions to access its files and content.

Log in or Sign Up to review the conditions and access this model content.

Modelscan Bypass PoC β€” plistlib.loads() macOS Plist Deserialization

Vulnerability

Modelscan 0.7.6 fails to detect malicious pickle files that use plistlib.loads for macOS config access β€” can deserialize plist data. Combined with file read primitives, can access macOS system preferences, app configs, and keychain-adjacent files.

The plistlib module is not in modelscan's unsafe_globals blocklist.

Chain

  1. plistlib.loads(data) β€” not blocked\n2. Deserializes macOS property list data\n3. Combined with io.open, can read system plist configs

Reproduction

modelscan scan -p pytorch_model.bin
# Result: "No issues found"

python3 -c "import pickle; result = pickle.loads(open('pytorch_model.bin','rb').read()); print(result)"
# Result: Deserializes plist XML data

Impact

macOS config access β€” can deserialize plist data. Combined with file read primitives, can access macOS system preferences, app configs, and keychain-adjacent files. Severity: MEDIUM.

Modelscan Version

0.7.6 (latest on PyPI as of 2026-04-09)

Downloads last month

-

Downloads are not tracked for this model. How to track
Inference Providers NEW
This model isn't deployed by any Inference Provider. πŸ™‹ Ask for provider support