Home » Database

AVID-2026-R0035

Description

picklescan - Security scanning bypass via ‘pip main’

Details

picklescan before 0.0.21 does not treat ‘pip’ as an unsafe global. An attacker could craft a malicious model that uses Pickle to pull in a malicious PyPI package (hosted, for example, on pypi.org or GitHub) via pip.main(). Because pip is not a restricted global, the model, when scanned with picklescan, would pass security checks and appear to be safe, when it could instead prove to be problematic.

References

Affected or Relevant Artifacts

  • Developer: mmaitre314
  • Deployer: mmaitre314
  • Artifact Details:
TypeName
Systempicklescan

Impact

AVID Taxonomy Categorization

  • Risk domains: Security
  • SEP subcategories: S0100: Software Vulnerability
  • Lifecycle stages: L06: Deployment

CWE

IDDescription
CWE-184CWE-184 Incomplete List of Disallowed Inputs

Other information

  • Report Type: Advisory
  • Credits:
  • Date Reported: 2025-02-26
  • Version: 0.2
  • AVID Entry