Safety vulnerability ID: 76324
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Picklescan fails to detect hidden pickle files embedded in PyTorch model archives due to its reliance on file extensions for detection. This allows an attacker to embed a secondary, malicious pickle file with a non-standard extension inside a model archive, which remains undetected by picklescan but is still loaded by PyTorch's torch.load() function. This can lead to arbitrary code execution when the model is loaded.
Latest version: 0.0.24
Security scanner detecting Python Pickle files performing suspicious actions
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application