You need to agree to share your contact information to access this model

This repository is publicly accessible, but you have to accept the conditions to access its files and content.

Log in or Sign Up to review the conditions and access this model content.

Flax/Orbax Path Traversal PoC (CWE-22)

Security Research - Proof of Concept

This repository contains a malicious Flax checkpoint that demonstrates a path traversal vulnerability in orbax-checkpoint. The _METADATA file contains absolute paths as parameter key names, which causes os.path.join() in tensorstore_utils.py to read zarr-format data from arbitrary filesystem locations.

Files

  • _METADATA โ€” Malicious checkpoint metadata (the attack payload)
  • poc.py โ€” Full PoC script that creates victim data, builds the malicious checkpoint, and demonstrates the path traversal

Usage

pip install flax orbax-checkpoint tensorstore numpy
python poc.py

Disclaimer

This PoC is for authorized security research only. The payload reads harmless test data created by the script itself.

Downloads last month

-

Downloads are not tracked for this model. How to track
Inference Providers NEW
This model isn't deployed by any Inference Provider. ๐Ÿ™‹ Ask for provider support