{"library":"pyarrow-hotfix","code":"import pyarrow_hotfix\nimport pyarrow as pa\n\n# The hotfix is applied simply by importing the module.\n# Any subsequent PyArrow operations will have the vulnerable feature disabled.\n# Example (will raise a RuntimeError if vulnerable data is encountered):\n# try:\n#     pa.ipc.open_file('malicious_data.arrow')\n# except RuntimeError as e:\n#     print(f\"Caught expected error: {e}\")","lang":"python","description":"The hotfix is activated simply by importing the `pyarrow_hotfix` module. This should be done early in your application's lifecycle to ensure the vulnerability is disabled before any potentially malicious PyArrow data is processed.","tag":null,"tag_description":null,"last_tested":"2026-04-24","results":[{"runtime":"python:3.10-alpine","exit_code":1},{"runtime":"python:3.10-slim","exit_code":1},{"runtime":"python:3.11-alpine","exit_code":1},{"runtime":"python:3.11-slim","exit_code":1},{"runtime":"python:3.12-alpine","exit_code":1},{"runtime":"python:3.12-slim","exit_code":1},{"runtime":"python:3.13-alpine","exit_code":1},{"runtime":"python:3.13-slim","exit_code":1},{"runtime":"python:3.9-alpine","exit_code":1},{"runtime":"python:3.9-slim","exit_code":1}]}