You need to agree to share your contact information to access this model

This repository is publicly accessible, but you have to accept the conditions to access its files and content.

Log in or Sign Up to review the conditions and access this model content.

Modelscan ctypes RCE Bypass PoC

Security research - modelscan bypass via ctypes.CDLL + operator.methodcaller.

DO NOT LOAD THESE FILES - they contain proof-of-concept code execution payloads.

Vulnerability

modelscan does not block the ctypes module or operator.methodcaller. This allows crafting pickle files that:

  1. Load libc via ctypes.CDLL("libc.so.6")
  2. Call system() to execute arbitrary commands
  3. Pass modelscan with "No issues found"

Affected

  • modelscan 0.7.x and earlier
  • Any system relying on modelscan to detect malicious pickle files

Modules Used

  • ctypes.CDLL - not in unsafe_globals blocklist
  • operator.methodcaller - only operator.attrgetter is blocked
Downloads last month

-

Downloads are not tracked for this model. How to track
Inference Providers NEW
This model isn't deployed by any Inference Provider. 🙋 Ask for provider support