python-sdk
Warn
Audited by Gen Agent Trust Hub on Mar 27, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONDATA_EXFILTRATIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The documentation includes multiple code examples demonstrating the use of the Python
eval()function to process arguments provided by tool calls (e.g., inreferences/tool-builder.mdandreferences/agent-patterns.md). Since tool arguments are generated by the agent based on potentially untrusted user input, this pattern facilitates arbitrary code execution. - [COMMAND_EXECUTION]: The skill documents and promotes the use of
internal_tools().code_execution(True), which grants agents the capability to execute code in their environment. - [DATA_EXFILTRATION]: The SDK provides a feature for 'Automatic File Upload' where local file paths provided as string inputs are automatically read and uploaded to the inference.sh cloud service. This creates a risk where an attacker could influence the agent to provide sensitive local file paths (such as
~/.ssh/id_rsaor.envfiles), leading to silent data exfiltration. - [EXTERNAL_DOWNLOADS]: The skill requires the installation of the
inferenceshpackage from the public Python Package Index (PyPI) and suggests installing additional skills usingnpxfrom the author's remote repository. - [COMMAND_EXECUTION]: The YAML frontmatter explicitly allows the execution of
pip installand arbitrarypythoncommands via theallowed-toolsconfiguration.
Audit Metadata