vllm-ascend
Fail
Audited by Socket on Mar 1, 2026
1 alert found:
Obfuscated FileObfuscated Filescripts/benchmark.py
HIGHObfuscated FileHIGH
scripts/benchmark.py
The script is a straightforward benchmarking tool but presents a moderate-to-high supply-chain and remote code execution risk because it enables trust_remote_code while accepting an arbitrary model path from the user. The file itself contains no obvious malicious logic or obfuscation, no hardcoded credentials, and no direct network/file operations; the primary concern is that model repositories loaded by vllm may execute arbitrary code. Recommend disabling trust_remote_code for untrusted models, restricting model sources to vetted/local repositories, and running the script in a sandbox with least privilege. Also fix the token-count logic (use tokenizer) to get correct throughput metrics.
Confidence: 98%
Audit Metadata