You need to agree to share your contact information to access this model

This repository is publicly accessible, but you have to accept the conditions to access its files and content.

Log in or Sign Up to review the conditions and access this model content.

Modelscan Bypass: marshal.loads() β†’ Code Object Deserialization

⚠️ SECURITY RESEARCH ONLY

Vulnerability

marshal.loads() deserializes Python code objects from bytes. Combined with types.FunctionType(), this enables constructing arbitrary executable functions from raw bytecode.

Impact

  • Type: Code Injection β€” Deserialize arbitrary Python bytecode
  • Step 1 of a code execution chain
  • Modelscan result: "No issues found"

Responsible Disclosure

Gated access. Reported to ProtectAI via Huntr.

Downloads last month

-

Downloads are not tracked for this model. How to track
Inference Providers NEW
This model isn't deployed by any Inference Provider. πŸ™‹ Ask for provider support