datamol
Pass
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: SAFEDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- Data Exposure & Exfiltration (LOW): The skill documentation in
references/io_module.mdandreferences/descriptors_viz.mdhighlights support for remote file protocols including S3, GCS, Azure, and HTTPS via thefsspeclibrary. Functions likedm.save_df,dm.to_sdf, anddm.viz.to_image(using theoutfileparameter) can be leveraged to transmit sensitive molecular data to external servers. - Indirect Prompt Injection (LOW): The library's core functionality involves ingesting complex data from external molecular files, creating a significant attack surface.
- Ingestion points:
dm.read_sdf,dm.read_csv,dm.read_smi, anddm.open_dfcan load data from potentially attacker-controlled remote or local sources. - Boundary markers: Absent. The documentation does not suggest the use of delimiters or 'ignore embedded instructions' warnings for the agent when processing these files.
- Capability inventory: The library has broad network and filesystem write capabilities via its I/O module.
- Sanitization: Absent. While chemical 'sanitization' is mentioned, it is limited to molecular structure validity and does not filter natural language instructions.
Audit Metadata