mlx-fine-tuning
Fail
Audited by Gen Agent Trust Hub on Mar 9, 2026
Risk Level: HIGHEXTERNAL_DOWNLOADSPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: The skill exhibits an indirect prompt injection surface (Category 8) by design, as it is intended to process external datasets for model fine-tuning.
- Ingestion points: The skill ingests training data from
train.jsonlandvalid.jsonlas described inSKILL.md. - Boundary markers: No explicit boundary markers or instructions to ignore embedded prompts within the JSONL data are specified.
- Capability inventory: The skill utilizes the
mlx_lmpackage to execute fine-tuning logic, which involves intensive processing of the provided data. - Sanitization: No sanitization or validation logic for the content of the training messages is provided in the skill scripts.
- [EXTERNAL_DOWNLOADS]: The environment validation script contains a reference to the official installer for the 'uv' package manager.
- Evidence: The script
scripts/validate_environment.pysuggests installinguvusingcurl -LsSf https://astral.sh/uv/install.sh | shif it is not found on the system. This targets the official domain of a well-known developer tool. - [COMMAND_EXECUTION]: The
scripts/validate_environment.pyscript executes several system commands to verify the environment. - Evidence: It uses
subprocess.runto callsysctlfor hardware information anduv --versionto check for the package manager. These are standard environment discovery operations.
Recommendations
- HIGH: Downloads and executes remote code from: https://astral.sh/uv/install.sh - DO NOT USE without thorough review
Audit Metadata