dvc-ml-workflow
Fail
Audited by Gen Agent Trust Hub on Apr 24, 2026
Risk Level: HIGHCOMMAND_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/init-dvc-project.shis vulnerable to shell command injection through the--remoteargument. It uses an internalrunfunction that callseval "$@"on a string containing the$REMOTE_URLvariable, allowing execution of arbitrary commands if the URL contains shell metacharacters like semicolons or backticks. - [COMMAND_EXECUTION]: The script
scripts/queue-helper.shcontains a command injection vulnerability in theenqueueandgridsubcommands. The script constructs a$flagsvariable from user-provided parameters and executesdvc exp run --queue $flagswithout quotes. This allows an attacker to inject shell commands by providing a parameter value that includes shell operators (e.g.,model.lr=1; rm -rf /).
Recommendations
- AI detected serious security threats
Audit Metadata