h100-sglang-diffusion
Pass
Audited by Gen Agent Trust Hub on Apr 30, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The skill makes extensive use of
sshanddocker execto run commands on a remote host (h100_sglang) and inside a container (sglang_bbuf). It includes instructions for passing sensitive tokens likeHF_TOKENdirectly in command-line arguments, which can expose them to process monitors on the host system. - [PROMPT_INJECTION]: The skill facilitates the ingestion of local file content and scripts into a remote environment for execution, representing an indirect prompt injection surface.
- Ingestion points: Local directory contents streamed via
tarinto/tmp/sglang_local_validateand local scripts piped topythonviadocker exec -i(SKILL.md). - Capability inventory: The environment allows remote command execution, file manipulation, and model serving via
ssh,docker exec,python, andpytest. - Boundary markers: No delimiters or instruction-ignore markers are specified for the transferred content.
- Sanitization: No validation or sanitization of the transferred local code is performed before execution.
- [EXTERNAL_DOWNLOADS]: The skill references the
lmsysorg/sglang:devDocker image and assumes a pre-existing clone of the SGLang repository on the remote host.
Audit Metadata