Simple Malicious Model POC
简单的恶意模型 POC,使用 LlamaTokenizer。
测试方法
在 LLaMA-Factory WebUI
- 切换到 Chat 标签
- Model name: 选择 TinyLlama-1.1B 或任意
- Model path: 1Teng/Deserialization_Model
- 点击 Load Model
Python 测试
from transformers import AutoConfig, AutoTokenizer
# 这会触发恶意代码
config = AutoConfig.from_pretrained(
"1Teng/Deserialization_Model",
trust_remote_code=True
)
tokenizer = AutoTokenizer.from_pretrained(
"1Teng/Deserialization_Model",
trust_remote_code=True
)
验证
- 计算器自动打开 = 成功
- 查看: /tmp/llama_poc_executed.txt
- Downloads last month
- 3
Inference Providers
NEW
This model isn't deployed by any Inference Provider.
🙋
Ask for provider support