hyperpod-ssm
Pass
Audited by Gen Agent Trust Hub on Apr 1, 2026
Risk Level: SAFECOMMAND_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The skill provides the
ssm-exec.shscript to execute arbitrary commands on remote AWS SageMaker HyperPod nodes using the AWS SSMstart-sessionAPI. This is the intended administrative functionality for managing HyperPod clusters. - [COMMAND_EXECUTION]: The skill implements file transfer (upload and read) by base64-encoding data and executing shell commands on the remote instance. Large files are automatically compressed using gzip to fit within SSM parameter limits.
- [COMMAND_EXECUTION]: The scripts demonstrate secure coding practices, such as using
jq @shfor shell-safe quoting of arguments to prevent local command injection and usingmktempwith restricted permissions (chmod 600) for sensitive temporary files. - [DATA_EXFILTRATION]: While the skill can read remote files and transmit data, all network operations are performed via the official AWS CLI targeting the user's own AWS infrastructure. No unauthorized external network requests or data exfiltration to third-party domains were detected.
Audit Metadata