datanalysis-credit-risk
Warn
Audited by Gen Agent Trust Hub on Mar 2, 2026
Risk Level: MEDIUMREMOTE_CODE_EXECUTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The function
get_datasetinreferences/func.pyutilizespd.read_pickleto load input data. As the file path is specified by user input, this allows for arbitrary code execution if a specially crafted pickle file is processed. - [REMOTE_CODE_EXECUTION]: The script
scripts/example.pydynamically modifiessys.pathto include several parent directories. This behavior can be exploited to achieve local code execution if an attacker can introduce malicious modules into the search paths.
Audit Metadata