mlflow-tracking
Pass
Audited by Gen Agent Trust Hub on Apr 24, 2026
Risk Level: SAFECREDENTIALS_UNSAFEEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [CREDENTIALS_UNSAFE]: The
assets/docker-compose-stack/.env.exampleanddocker-compose.yamlfiles contain default passwords (mlflowfor PostgreSQL andminioadminfor MinIO). However, the skill provides ascripts/start-mlflow-server.shscript that implements a secure secret rotation mechanism during initialization, replacing these defaults with random 24-character hex strings generated fromopensslor/dev/urandom. - [PROMPT_INJECTION]: The skill establishes a surface for indirect prompt injection by collecting and processing LLM traces. 1. Ingestion points: Data enters the agent's environment from external LLM providers via the tracking server. 2. Boundary markers: No explicit delimiters or markers are used to isolate logged data from instructions. 3. Capability inventory: The
scripts/tail-runs.shutility allows the agent to read and process these logged runs and traces. 4. Sanitization: While the documentation identifies risks such as PII in traces, no automated sanitization or filtering is implemented in the provided scripts. - [EXTERNAL_DOWNLOADS]: The skill downloads the official MLflow container image from
ghcr.ioand utilizes standard Python packages from PyPI (psycopg2-binary,boto3,mlflow,pandas). It also referencesmlflow-widgets, a package authored by the skill's vendor. All resources are sourced from well-known repositories or the verified vendor infrastructure.
Audit Metadata