You need to agree to share your contact information to access this model

This repository is publicly accessible, but you have to accept the conditions to access its files and content.

Log in or Sign Up to review the conditions and access this model content.

YAML Metadata Warning:empty or missing yaml metadata in repo card

Check out the documentation for more information.

Joblib NDArrayWrapper Scanner Bypass PoC

Vulnerability

model.joblib achieves arbitrary code execution via joblib.load() while bypassing both picklescan and modelscan.

The .joblib file contains a legacy NDArrayWrapper that references model.weights. On load, joblib calls np.load("model.weights", allow_pickle=True) โ€” executing the pickle payload in the companion file.

Scanner Results

picklescan -p .  โ†’  Infected files: 0, Dangerous globals: 0
modelscan  -p .  โ†’  No issues found!

Reproduction

import joblib
joblib.load("model.joblib")
# โ†’ executes payload from model.weights

Root Cause

joblib/numpy_pickle_compat.py line 110: unconditional allow_pickle=True joblib/numpy_pickle_compat.py line 99: no validation on attacker-controlled filename

Downloads last month

-

Downloads are not tracked for this model. How to track
Inference Providers NEW
This model isn't deployed by any Inference Provider. ๐Ÿ™‹ Ask for provider support