You need to agree to share your contact information to access this model

This repository is publicly accessible, but you have to accept the conditions to access its files and content.

Log in or Sign Up to review the conditions and access this model content.

Joblib ModelScan recursive load bypass PoC

Security proof-of-concept for a Huntr Model File Vulnerabilities report.

This repository contains a minimal .joblib artifact demonstrating that current ModelScan can report a malicious Joblib model file as clean while normal joblib.load() executes a harmless local marker payload.

Do not load the candidate outside a sandbox.

Files

  • candidate_nested_joblib_load_bytes.joblib: scanner-bypass candidate.
  • safe.joblib: benign control.
  • REPRODUCTION.md: sanitized reproduction steps.

Expected behavior

ModelScan reports zero issues for candidate_nested_joblib_load_bytes.joblib. Normal joblib.load() creates /tmp/huntr_joblib_nested_load_marker with HUNTR_JOBLIB_NESTED_LOAD.

Downloads last month

-

Downloads are not tracked for this model. How to track
Inference Providers NEW
This model isn't deployed by any Inference Provider. 🙋 Ask for provider support