PickleScan

raw JSON →
1.0.4 verified Fri May 01 auth: no python

A security scanner that detects malicious Pickle files by analyzing the bytecode for suspicious operations like arbitrary code execution, file I/O, and import of dangerous modules. Version 1.0.4, released monthly.

pip install picklescan
error ModuleNotFoundError: No module named 'picklescan'
cause Library not installed.
fix
Run pip install picklescan.
error ImportError: cannot import name 'scan_pickle_file' from 'picklescan'
cause Old version of picklescan does not have the public function (added in v0.0.35).
fix
Upgrade to the latest version: pip install --upgrade picklescan.
error AttributeError: module 'picklescan' has no attribute 'main'
cause Attempting to run CLI via Python script incorrectly.
fix
Use the command line: picklescan --help or run as module: python -m picklescan.
breaking PickleScan is a detection tool, not a prevention tool. It can be bypassed by sophisticated attackers. Do not rely on it as the sole security measure.
fix Always verify the source of pickle files and use sandboxing if possible.
deprecated Importing `picklescan.scanner` directly may cause confusion; the module is not publicly documented as stable API. Changes in internal module structure can break imports.
fix Use the documented CLI or the official `scan_pickle_file` / `scan_pytorch_file` functions.
gotcha The scanner may produce false negatives for obfuscated payloads. Some bypasses have been patched but new ones may exist.
fix Update to the latest version regularly and combine with other security measures.

Scan a pickle file for malicious opcodes.

from picklescan.scanner import scan_pickle_file

result = scan_pickle_file("model.pkl")
if result.issues:
    print("Dangerous pickle detected!")
else:
    print("File appears safe")