Harden pickle.load()
against deserialization attacks
#3
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Python's
pickle
module is notoriouly insecure. While it is very useful for serializing and deserializing Python objects, it is not safe to usepickle
to load data from untrusted sources. This is becausepickle
can execute arbitrary code when loading data. This can be exploited by an attacker to execute arbitrary code on your system. Unlikeyaml
there is no concept of a "safe" loader inpickle
. Therefore, it is recommended to avoidpickle
and to use a different serialization format such asjson
oryaml
when working with untrusted data.However, if you must use
pickle
to load data from an untrusted source, we recommend using the open-sourcefickling
library.fickling
is a drop-in replacement forpickle
that validates the data before loading it and checks for the possibility of code execution. This makes it much safer (although still not entirely safe) to usepickle
to load data from untrusted sources.This codemod replaces calls to
pickle.load
withfickling.load
in Python code. It also adds an import statement forfickling
if it is not already present.The changes look like the following:
Dependency Updates
This codemod relies on an external dependency. We have automatically added this dependency to your project's
requirements.txt
file.This package provides analysis of pickled data to help identify potential security vulnerabilities.
There are a number of places where Python project dependencies can be expressed, including
setup.py
,pyproject.toml
,setup.cfg
, andrequirements.txt
files. If this change is incorrect, or if you are using another packaging system such aspoetry
, it may be necessary for you to manually add the dependency to the proper location in your project.More reading
I have additional improvements ready for this repo! If you want to see them, leave the comment:
... and I will open a new PR right away!
🧚🤖 Powered by Pixeebot
Feedback | Community | Docs | Codemod ID: pixee:python/harden-pickle-load