You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Add audit hooks for pickle.load, pickle.loads, and pickle.Unpickler
Add sys.audit() calls to pickle deserialization entry points so that
audit hook callbacks can monitor or block untrusted pickle data before
deserialization begins. This complements the existing pickle.find_class
audit event which only fires when resolving globals during unpickling.
New audit events:
- pickle.load(file) - raised by pickle.load()
- pickle.loads(data) - raised by pickle.loads()
- pickle.Unpickler(file) - raised by pickle.Unpickler()
These are added to both the pure Python (Lib/pickle.py) and C-accelerated
(Modules/_pickle.c) implementations.
https://claude.ai/code/session_01EonnbetfRuaXpkjG3KHw4f
0 commit comments