model-verify
Fail
Audited by Gen Agent Trust Hub on Mar 25, 2026
Risk Level: HIGHCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: Direct interpolation of user-supplied variables such as
<CONTAINER>,<MODEL_PATH>, and<MODEL_ID>intodocker execanddocker cpcommands inSKILL.mdcreates a significant command injection surface. An attacker could provide malicious strings to execute arbitrary commands on the host or within the container.- [REMOTE_CODE_EXECUTION]: The skill utilizes the--trust-remote-codeflag in multiplepython3execution steps withinSKILL.md. This allows the inference engine to execute arbitrary Python code defined in the model's configuration (e.g., custom kernels or layers), which is dangerous when loading models from external sources.- [EXTERNAL_DOWNLOADS]: The skill downloads model weights and associated code from external sources (ModelScope or HuggingFace) usingsnapshot_downloadinSKILL.md. When combined with the execution of downloaded code via the trust-remote-code flag, this represents a significant security risk.
Recommendations
- AI detected serious security threats
Audit Metadata