llm-torch-profiler-analysis

Warn

Audited by Socket on May 3, 2026

1 alert found:

Security
SecurityMEDIUM
scripts/run_llm_single_model_matrix_host.sh

No direct evidence of malware (e.g., exfiltration, backdoor, destructive actions) is present in this fragment. However, the script significantly increases supply-chain execution risk by using --trust-remote-code and by generating and injecting a TensorRT-LLM py_executor Python override into a container. Tokens are also propagated to multiple subprocesses. If the called scripts or remote model repositories are compromised, this harness could execute attacker-controlled code. Recommend reviewing the referenced runner scripts (run_*_profile_host.sh) and make_trtllm_py_executor_override.py, and avoid or strictly control --trust-remote-code for untrusted model sources.

Confidence: 62%Severity: 70%
Audit Metadata
Analyzed At
May 3, 2026, 03:23 AM
Package URL
pkg:socket/skills-sh/BBuf%2FSGLang-Auto-Driven-SKILLS%2Fllm-torch-profiler-analysis%2F@e14b2da3575f23e50ecd78134c046ed8c3fb2bc0