Unsafe Pickle Deserialization
criticalDetects unsafe pickle deserialization where untrusted data flows to pickle.loads() leading to RCE
Detects unsafe pickle deserialization where untrusted data flows to pickle.loads() leading to RCE
Experiment with the vulnerable code and security rule below. Edit the code to see how the rule detects different vulnerability patterns.
pathfinder scan --rule cpf/python-deser-pickleExplore related security rules for Python
Common questions about Unsafe Pickle Deserialization
Use Code Pathfinder to scan your Python codebase and automatically detect instances of this vulnerability pattern. Install Code Pathfinder and run the following command in your project directory:
pathfinder scan --rule cpf/python-deser-pickleThis rule is aligned with industry-standard security frameworks and classifications: