geniml
Warn
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: MEDIUMEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTION
Full Analysis
- [External Downloads] (MEDIUM): The documentation describes loading pre-trained models from the Hugging Face Hub using
ScEmbed.from_pretrained('databio/scembed-pbmc-10k'). Since thedatabioorganization is not on the trusted list, this poses a risk of downloading untrusted content. - [Remote Code Execution] (MEDIUM): Several components such as
BEDSpaceModel.loadandScEmbed.from_pretrainedinvolve loading serialized model states. In Python environments, this often usespickleor similar mechanisms that can execute arbitrary code when processing a malicious file. - [Command Execution] (LOW): The skill requires and executes external binaries like
StarSpace. While the sourcefacebookresearchis a trusted organization, the execution of external binaries remains a significant capability. Severity is downgraded to LOW per the [TRUST-SCOPE-RULE]. - [Indirect Prompt Injection] (LOW): The skill ingests untrusted genomic data and metadata CSV files which could potentially contain adversarial instructions. 1. Ingestion points:
metadata.csvinbedspace.mdandBBClientdownloads inutilities.md. 2. Boundary markers: Absent. 3. Capability inventory: CLI execution (uniwig,geniml) and Python execution. 4. Sanitization: No input validation of genomic coordinates or metadata strings is mentioned.
Audit Metadata