YAML Metadata Warning:empty or missing yaml metadata in repo card
Check out the documentation for more information.
Joblib NDArrayWrapper Scanner Bypass PoC
Vulnerability
model.joblib achieves arbitrary code execution via joblib.load() while bypassing both picklescan and modelscan.
The .joblib file contains a legacy NDArrayWrapper that references model.weights. On load, joblib calls np.load("model.weights", allow_pickle=True) โ executing the pickle payload in the companion file.
Scanner Results
picklescan -p . โ Infected files: 0, Dangerous globals: 0
modelscan -p . โ No issues found!
Reproduction
import joblib
joblib.load("model.joblib")
# โ executes payload from model.weights
Root Cause
joblib/numpy_pickle_compat.py line 110: unconditional allow_pickle=True
joblib/numpy_pickle_compat.py line 99: no validation on attacker-controlled filename
Inference Providers NEW
This model isn't deployed by any Inference Provider. ๐ Ask for provider support