#0601
Your Python service accepts serialized user preferences from a cookie or API body.
The function blindly deserialises whatever it receives. An attacker crafts a pickle payload (identifiable by the `\x80` magic byte prefix or a `pickle:` tag) that executes arbitrary code when loaded.
Python's pickle module is a remote code execution primitive. Any user-controlled input reaching `pickle.loads` gives attackers full shell access on the server.
loadUserPrefs('\x80pickle_data')# raises: ValueError('Unsafe deserialisation')
loadUserPrefs('{"name":"alice","theme":"dark"}')# returns: {'name': 'alice', 'theme': 'dark'}