Harden pickle.load() against deserialization attacks
#77
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Python's
picklemodule is notoriouly insecure. While it is very useful for serializing and deserializing Python objects, it is not safe to usepickleto load data from untrusted sources. This is becausepicklecan execute arbitrary code when loading data. This can be exploited by an attacker to execute arbitrary code on your system. Unlikeyamlthere is no concept of a "safe" loader inpickle. Therefore, it is recommended to avoidpickleand to use a different serialization format such asjsonoryamlwhen working with untrusted data.However, if you must use
pickleto load data from an untrusted source, we recommend using the open-sourceficklinglibrary.ficklingis a drop-in replacement forpicklethat validates the data before loading it and checks for the possibility of code execution. This makes it much safer (although still not entirely safe) to usepickleto load data from untrusted sources.This codemod replaces calls to
pickle.loadwithfickling.loadin Python code. It also adds an import statement forficklingif it is not already present.The changes look like the following:
Dependency Updates
This codemod relies on an external dependency. We have automatically added this dependency to your project's
pyproject.tomlfile.This package provides analysis of pickled data to help identify potential security vulnerabilities.
There are a number of places where Python project dependencies can be expressed, including
setup.py,pyproject.toml,setup.cfg, andrequirements.txtfiles. If this change is incorrect, or if you are using another packaging system such aspoetry, it may be necessary for you to manually add the dependency to the proper location in your project.More reading
I have additional improvements ready for this repo! If you want to see them, leave the comment:
... and I will open a new PR right away!
🧚🤖 Powered by Pixeebot
Feedback | Community | Docs | Codemod ID: pixee:python/harden-pickle-load