You need to agree to share your contact information to access this model

This repository is publicly accessible, but you have to accept the conditions to access its files and content.

Log in or Sign Up to review the conditions and access this model content.

Modelscan Bypass: pkgutil.resolve_name β†’ Universal RCE

⚠️ SECURITY RESEARCH ONLY β€” DO NOT LOAD UNTRUSTED MODELS

Vulnerability

pkgutil.resolve_name() can resolve ANY Python callable at runtime. This makes the ENTIRE modelscan blocklist irrelevant β€” a single function call can reach os.system, subprocess.call, or any other blocked callable.

Impact

  • CVSS: 10.0 β€” Universal blocklist bypass
  • Type: RCE β€” Arbitrary command execution
  • Modelscan result: "No issues found" on both .pkl and .bin formats

Chain

pkgutil.resolve_name("os.system") β†’ <built-in function system>
os.system("command") β†’ RCE

Affected

  • modelscan (all versions through 0.8.7)
  • Any scanner using module-name blocklists

Responsible Disclosure

This repo uses gated access. Findings reported to ProtectAI via Huntr.

Downloads last month

-

Downloads are not tracked for this model. How to track
Inference Providers NEW
This model isn't deployed by any Inference Provider. πŸ™‹ Ask for provider support