You need to agree to share your contact information to access this model

This repository is publicly accessible, but you have to accept the conditions to access its files and content.

Log in or Sign Up to review the conditions and access this model content.

YAML Metadata Warning:empty or missing yaml metadata in repo card

Check out the documentation for more information.

PyTorch v0.1.10 Scanner Bypass PoC

Vulnerability Summary

Format: PyTorch v0.1.10 (.pt) Scanner Bypass: modelscan 0.8.7 (PyTorchUnsafeOpScan) + picklescan 1.0.1 (DUAL BYPASS) Impact: Arbitrary Code Execution

Key Finding

modelscan ACTIVELY SCANS this file with PyTorchUnsafeOpScan but still reports "No issues found." The joblib numpy byte interleaving technique crashes pickletools.genops() before reaching the malicious reduce call, causing the scanner to silently fail.

Reproduction

modelscan -p malicious_pytorch_v0110.pt    # Uses PyTorchUnsafeOpScan, reports no issues
picklescan -p malicious_pytorch_v0110.pt   # Reports no issues
python3 -c "import joblib; joblib.load('malicious_pytorch_v0110.pt')"  # ACE confirmed
Downloads last month

-

Downloads are not tracked for this model. How to track
Inference Providers NEW
This model isn't deployed by any Inference Provider. 🙋 Ask for provider support