python-executor
Pass
Audited by Gen Agent Trust Hub on Mar 10, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill utilizes the
infshCLI tool to run theinfsh/python-executorapp, which is a legitimate use of the vendor's provided infrastructure. - [EXTERNAL_DOWNLOADS]: The documentation references the installation of
inference-sh/skills@agent-toolsvianpxand interactions with theinference.shdomain, both of which are official vendor resources. - [REMOTE_CODE_EXECUTION]: The skill's primary function is the remote execution of Python code. This is conducted within a sandbox environment and is the intended purpose of the skill.
- [PROMPT_INJECTION]: The skill presents an attack surface for indirect prompt injection because it executes code provided via input parameters.
- Ingestion points: Untrusted code enters through the
codefield in the input JSON schema. - Boundary markers: There are no explicit delimiters or instructions within the skill definition to prevent the model from obeying instructions embedded in the provided code.
- Capability inventory: The execution environment includes full network access (via
requests,httpx), file system access within the sandbox, and 100+ powerful libraries for data and file manipulation. - Sanitization: No sanitization or validation of the input Python code is performed by the skill itself, relying instead on the remote environment's sandbox for security.
Audit Metadata