manja316's picture
Upload README.md with huggingface_hub
e5cf71d verified
metadata
language: en
tags:
  - security-research
  - proof-of-concept
license: mit

Security Research PoC — modelscan bypass

This repository contains a proof-of-concept model file demonstrating a bypass of ProtectAI's modelscan scanner.

DO NOT load untrusted model files. This file executes arbitrary code on load.

Vulnerability

The pickle payload uses importlib.import_module combined with operator.methodcaller to achieve code execution. Neither module is in modelscan's unsafe_globals blocklist.

Impact

Any pickle-based model file (.pkl, .bin, .pt, .pth, .ckpt) can bypass modelscan and execute arbitrary code. The fundamental issue is that blocking individual modules (os, subprocess, etc.) is insufficient when importlib.import_module can dynamically import any module at runtime.

Tested Against

modelscan 0.7.6 (latest pip release)