hyperpod-ssm

Pass

Audited by Gen Agent Trust Hub on Apr 1, 2026

Risk Level: SAFECOMMAND_EXECUTION
Full Analysis
  • [COMMAND_EXECUTION]: The skill provides the ssm-exec.sh script to execute arbitrary commands on remote AWS SageMaker HyperPod nodes using the AWS SSM start-session API. This is the intended administrative functionality for managing HyperPod clusters.
  • [COMMAND_EXECUTION]: The skill implements file transfer (upload and read) by base64-encoding data and executing shell commands on the remote instance. Large files are automatically compressed using gzip to fit within SSM parameter limits.
  • [COMMAND_EXECUTION]: The scripts demonstrate secure coding practices, such as using jq @sh for shell-safe quoting of arguments to prevent local command injection and using mktemp with restricted permissions (chmod 600) for sensitive temporary files.
  • [DATA_EXFILTRATION]: While the skill can read remote files and transmit data, all network operations are performed via the official AWS CLI targeting the user's own AWS infrastructure. No unauthorized external network requests or data exfiltration to third-party domains were detected.
Audit Metadata
Risk Level
SAFE
Analyzed
Apr 1, 2026, 04:46 PM