Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Appearance settings

fix: Add HMAC integrity verification for Triton inference handler#5646

Open
pravali96 wants to merge 2 commits intoaws:masteraws/sagemaker-python-sdk:masterfrom
pravali96:fix/triton-hmac-security-v3pravali96/sagemaker-python-sdk:fix/triton-hmac-security-v3Copy head branch name to clipboard
Open

fix: Add HMAC integrity verification for Triton inference handler#5646
pravali96 wants to merge 2 commits intoaws:masteraws/sagemaker-python-sdk:masterfrom
pravali96:fix/triton-hmac-security-v3pravali96/sagemaker-python-sdk:fix/triton-hmac-security-v3Copy head branch name to clipboard

Conversation

@pravali96
Copy link
Collaborator

  • Add HMAC integrity check before pickle deserialization in TritonPythonModel.initialize()
  • Replace hardcoded secret key with generate_secret_key() in _prepare_for_triton() ONNX path
  • Add _hmac_signing() after ONNX export for both PyTorch and TensorFlow frameworks
  • Add secret key validation in _start_triton_server() to reject None/empty keys

Fixes RCE vulnerabilities in Triton handler by aligning with HMAC verification patterns used by TorchServe, MMS, TF Serving, and SMD handlers.

Issue #, if available:

Description of changes:

By submitting this pull request, I confirm that you can use, modify, copy, and redistribute this contribution, under the terms of your choice.

@pravali96 pravali96 force-pushed the fix/triton-hmac-security-v3 branch from f832dd2 to 90d93dd Compare March 18, 2026 22:18
@pravali96 pravali96 force-pushed the fix/triton-hmac-security-v3 branch from 9ed3c6d to 187eecb Compare March 19, 2026 17:06
@pravali96 pravali96 force-pushed the fix/triton-hmac-security-v3 branch from 115b927 to 9ae59b2 Compare March 19, 2026 18:23
- Add HMAC integrity check before pickle deserialization in TritonPythonModel.initialize()
- Replace hardcoded secret key with generate_secret_key() in _prepare_for_triton() ONNX path
- Add _hmac_signing() after ONNX export for both PyTorch and TensorFlow frameworks
- Add secret key validation in _start_triton_server() to reject None/empty keys

Fixes RCE vulnerabilities in Triton handler by aligning with HMAC verification
patterns used by TorchServe, MMS, TF Serving, and SMD handlers.
@pravali96 pravali96 force-pushed the fix/triton-hmac-security-v3 branch from 9ae59b2 to 7101c0b Compare March 19, 2026 18:29
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant

Morty Proxy This is a proxified and sanitized view of the page, visit original site.