python-sdk
Fail
Audited by Gen Agent Trust Hub on Mar 10, 2026
Risk Level: HIGHCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [REMOTE_CODE_EXECUTION]: The documentation in
references/tool-builder.mdprovides multiple examples (under 'Basic Handler' and 'Complete Example') of using theeval()function to process tool arguments (e.g.,eval(call.args['expression'])). Since these arguments are generated by an AI model which can be influenced by malicious user prompts, this creates a direct path for remote code execution. - [COMMAND_EXECUTION]: The skill's primary configuration in
SKILL.mddefines an allowed toolBash(python *), which grants the agent the capability to execute arbitrary Python commands on the host environment. - [EXTERNAL_DOWNLOADS]: The skill requires the installation of the vendor's
inferenceshpackage from PyPI. Additionally, reference files (references/files.md,references/async-patterns.md) include examples that depend on other external libraries such asrequests,aiohttp, andtqdm. - [PROMPT_INJECTION]: As an Agent SDK, this skill is a large surface for indirect prompt injection. The documentation shows agents processing files and web search results without explicit boundary markers or sanitization patterns to prevent the agent from following instructions embedded in that untrusted data.
Recommendations
- AI detected serious security threats
Audit Metadata