While Running application using yolov5 during sast checkmarx scan it gives high severity warning. #10849
akashlinux10may
started this conversation in
General
Replies: 0 comments
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
While deploying the application in real time production using yolov5 custom model, in checkmarx scan I got the high severity warning for following files.
yolov5\models\experimental.py (line 88)
Warning: Attacker can inject and run arbitrary code
yolov5\hubconf.py (line 143)
Warning: Attacker can inject the code via user input.
Impact: Could not able to run the model in secure environment.
Please suggest the resolution.
Is there any way we can load the yolov5 model without Yolov5 folder
I tried this but Following code is not working
model = torch.hub.load('.', 'custom', source ='local', path='last.pt',force_reload=True)
Please suggest alternative for following:
model = torch.hub.load('yolov5', 'custom', source ='local', path='last.pt',force_reload=True)
Beta Was this translation helpful? Give feedback.
All reactions