code-interpreter
Warn
Audited by Gen Agent Trust Hub on Mar 3, 2026
Risk Level: MEDIUMREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The
execute_codetool enables the execution of arbitrary Python, JavaScript, and TypeScript code. This is a primary feature of the skill but represents a significant attack surface as it allows for the execution of complex logic within the sandbox. - [COMMAND_EXECUTION]: The
execute_commandtool provides a direct interface to a shell environment, allowing for the execution of arbitrary terminal commands (e.g.,pip install,ls,curl). - [EXTERNAL_DOWNLOADS]: The skill documentation encourages and provides examples for downloading external content via
pip installfor third-party packages andrequests.getfor fetching data from remote URLs. - [DATA_EXFILTRATION]: The skill possesses a complete set of primitives for data exfiltration. It can read local sensitive files using
file_operationsor code, and it has network access via libraries likerequestsandboto3or shell commands likecurlto transmit that data to external endpoints. - [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection. It ingests untrusted data through
requests.get(web content) andci_pull_from_workspace(files from a shared S3 bucket). Malicious instructions embedded in these sources could influence the agent's behavior. The sandbox documentation does not specify the use of boundary markers or content sanitization to mitigate this risk.
Audit Metadata