python-executor
Pass
Audited by Gen Agent Trust Hub on Mar 17, 2026
Risk Level: SAFECOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill uses the
infshCLI tool (allowed viaBash(infsh *)) to execute tasks on the vendor's platform. - [REMOTE_CODE_EXECUTION]: The primary function of this skill is to transmit and execute Python code on the remote
inference.shinfrastructure. The environment is pre-configured with numerous libraries, including those for networking and browser automation. - [PROMPT_INJECTION]: The skill exhibits a surface for indirect prompt injection because it executes code provided in the
codeparameter, which an agent might generate based on untrusted input. - Ingestion points: The
codefield in the input JSON schema (SKILL.md). - Boundary markers: No specific delimiters or instructions are provided to the agent to treat the input code as potentially untrusted or to ignore embedded instructions.
- Capability inventory: The remote environment provides a full Python 3.10 interpreter with capabilities for network access (e.g.,
requests,httpx), browser automation (e.g.,selenium,playwright), and file system access within the sandbox, managed via theinfshtool. - Sanitization: The skill definition does not include logic for sanitizing or validating the Python code before execution.
Audit Metadata