hackthesoul commited on
Commit
0e40475
·
1 Parent(s): 94ccf79

Add NPY/NPZ scanner bypass PoC + warning README

Browse files
README.md ADDED
@@ -0,0 +1,25 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ # ⚠️ WARNING — Security Research PoC
2
+
3
+ > **DO NOT load these files with `np.load(allow_pickle=True)` in production environments.**
4
+ > **DO NOT use these files for any purpose other than security research.**
5
+
6
+ ## What is this?
7
+
8
+ This repository contains **proof-of-concept .npy and .npz files** created for **responsible security vulnerability disclosure** via [huntr.com](https://huntr.com).
9
+
10
+ ## Vulnerability Type
11
+
12
+ **Scanner Bypass / Arbitrary Code Execution (CWE-502)**
13
+
14
+ Malicious `.npy` and `.npz` files containing pickle RCE payloads that bypass modelscan 0.8.8 detection on numpy >= 2.3.0. modelscan uses `np.lib.format._check_version` which was removed in numpy 2.3.0, causing the scanner to crash silently and report "No issues found!" while the files contain executable pickle payloads.
15
+
16
+ ## Important Notes
17
+
18
+ - 🔴 **These files contain pickle payloads that WILL EXECUTE CODE when loaded with `np.load(allow_pickle=True)`.**
19
+ - 🔴 **DO NOT load in any production, staging, or shared environment.**
20
+ - The PoC payload is benign (writes a proof file) but the technique allows arbitrary code execution.
21
+ - **This repository will be removed or made private after the vulnerability review process is complete.**
22
+
23
+ ## Responsible Disclosure
24
+
25
+ This PoC is part of a responsible disclosure process through [huntr.com](https://huntr.com).
malicious_scanner_bypass.npy ADDED
Binary file (367 Bytes). View file
 
malicious_scanner_bypass.npz ADDED
Binary file (501 Bytes). View file