Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-1716 PoC — picklescan - Security scanning bypass via 'pip main'

Source
Associated Vulnerability
Title:picklescan - Security scanning bypass via 'pip main' (CVE-2025-1716)
Description:picklescan before 0.0.21 does not treat 'pip' as an unsafe global. An attacker could craft a malicious model that uses Pickle to pull in a malicious PyPI package (hosted, for example, on pypi.org or GitHub) via `pip.main()`. Because pip is not a restricted global, the model, when scanned with picklescan, would pass security checks and appear to be safe, when it could instead prove to be problematic.
Readme
# poc_CVE-2025-1716
File Snapshot

[4.0K] /data/pocs/48b0b850c04ea19233c963780331ae5e42144ee2 ├── [ 19] README.md └── [ 402] setup.py 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →