Modelscan Bypass PoC β shutil.move() File Move/Rename
Vulnerability
Modelscan 0.7.6 fails to detect malicious pickle files that use shutil.move for Arbitrary file move/rename β can displace critical files, rename config files, or move sensitive data to accessible locations.
The shutil module is not in modelscan's unsafe_globals blocklist.
Chain
shutil.move(src, dst)β not blocked\n2. Moves or renames any file the process can access
Reproduction
modelscan scan -p pytorch_model.bin
# Result: "No issues found"
python3 -c "import pickle; result = pickle.loads(open('pytorch_model.bin','rb').read()); print(result)"
# Result: Moves file to attacker-controlled location
Impact
Arbitrary file move/rename β can displace critical files, rename config files, or move sensitive data to accessible locations. Severity: HIGH.
Modelscan Version
0.7.6 (latest on PyPI as of 2026-04-09)
Inference Providers NEW
This model isn't deployed by any Inference Provider. π Ask for provider support